Site To Site VPN R80.10: Administration Guide
Site To Site VPN R80.10: Administration Guide
R80.10
Administration Guide
Classification: [Protected]
© 2017 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and
distributed under licensing restricting their use, copying, distribution, and decompilation. No part
of this product or related documentation may be reproduced in any form or by any means without
prior written authorization of Check Point. While every precaution has been taken in the
preparation of this book, Check Point assumes no responsibility for errors or omissions. This
publication and features described herein are subject to change without notice.
RESTRICTED RIGHTS LEGEND:
Use, duplication, or disclosure by the government is subject to restrictions as set forth in
subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS
252.227-7013 and FAR 52.227-19.
TRADEMARKS:
Refer to the Copyright page http://www.checkpoint.com/copyright.html for a list of our
trademarks.
Refer to the Third Party copyright notices http://www.checkpoint.com/3rd_party_copyright.html
for a list of relevant copyrights and third-party licenses.
Important Information
Latest Software
We recommend that you install the most recent software release to stay up-to-date
with the latest functional improvements, stability fixes, security enhancements and
protection against new and evolving attacks.
Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments
mailto:[email protected]?subject=Feedback on Site to Site VPN
R80.10 Administration Guide.
Revision History
Date Description
16 May 2017 First release of this document
Important Information
SmartConsole Toolbars
For a guided tour of SmartConsole, click What's New in the left bottom corner of SmartConsole.
Manage & Settings view - review and configure the Security Management
Server settings
Ctrl+4
Connected The administrators that are connected to the Security Management Server
Users
IPsec VPN
The IPsec VPN solution lets the Security Gateway encrypt and decrypt traffic to and from other
gateways and clients. Use SmartConsole to easily configure VPN connections between Security
Gateways and remote devices.
For Site to Site Communities, you can configure Star and Mesh topologies for VPN networks, and
include third-party gateways.
The VPN tunnel guarantees:
• Authenticity - Uses standard authentication methods
• Privacy - All VPN data is encrypted
• Integrity - Uses industry-standard integrity assurance methods
VPN Components
VPN is composed of:
• VPN endpoints, such as Security Gateways, Security Gateway clusters, or remote clients (such
as laptop computers or mobile phones) that communicate using a VPN.
• VPN trust entities, such as a Check Point Internal Certificate Authority (ICA). The ICA is part of
the Check Point suite used for creating SIC trusted connection between Security Gateways,
authenticating administrators and third party servers. The ICA provides certificates for internal
Security Gateways and remote access clients which negotiate the VPN link.
• VPN Management tools, such as Security Management Server and SmartConsole.
SmartConsole is the SmartConsole used to access the Security Management Server. The VPN
Manager is part of SmartConsole. SmartConsole enables organizations to define and deploy
Intranet, and remote Access VPNs.
• Virtual Tunnel Interface - Virtual Tunnel Interface. A virtual interface that is a member of an
existing, Route Based, VPN tunnel.
• VPN Peer - A gateway that connects to a different gateway using a Virtual Tunnel Interface.
• VPN Domain - A group of computers and networks connected to a VPN tunnel by one VPN
gateway that handles encryption and protects the VPN Domain members.
• VPN Community - A named collection of VPN domains, each protected by a VPN gateway.
• VPN Security Gateway - The gateway that manages encryption and decryption of traffic
between members of a VPN Domain, typically located at one (Remote Access VPN) or both
(Site to Site VPN) ends of a VPN tunnel.
• Site to Site VPN - An encrypted tunnel between two gateways, typically of different
geographical sites.
• Remote Access VPN - An encryption tunnel between a Security Gateway and remote access
clients, such as Endpoint Security VPN, and communities.
• Remote Access Community - A group of computers, appliances, and devices that access, with
authentication and encryption, the internal protected network from physically remote sites.
• Star Topology - A "hub and spoke" virtual private network community, with gateways defined
as Satellites (spokes) that create tunnels only with the central gateway ("hub").
• Meshed topology - A VPN community with a VPN Domain that creates a tunnel to other VPN
Domains.
• Domain-based VPN - A method to route encrypted traffic with parameters defined by Security
Gateways.
• Route-Based VPN - A routing method for participants in a VPN community, defined by the
Virtual Tunnel Interfaces (VTI).
• IKE (Internet Key Exchange) - An Encryption key management protocol that enhances IPSec
by providing additional features, flexibility, and ease of configuration.
• IPSec - A set of secure VPN protocols that manage encryption keys and encrypted packet
traffic, to create a standard for authentication and encryption services.
Item Description
A, B Security Gateways
2 VPN tunnel
4 Host 4
5 Host 5
In this sample VPN deployment, Host 4 and Host 5 securely send data to each other. The Security
Gateways do IKE negotiation and create a VPN tunnel. They use the IPsec protocol to encrypt and
decrypt data that is sent between Host 4 and Host 5.
VPN Workflow
VPN Communities
A VPN Domain is a collection of internal networks that use Security Gateways to send and receive
VPN traffic. Define the resources that are included in the VPN Domain for each Security Gateway.
Then join the Security Gateways into a VPN community - collection of VPN tunnels and their
attributes. Network resources of different VPN Domains can securely communicate with each
other through VPN tunnels that terminate at the Security Gateways in the VPN communities.
VPN communities are based on Star and Mesh topologies. In a Mesh community, there are VPN
tunnels between each pair of Security Gateway. In a Star community, each satellite Security
Gateway has a VPN tunnel to the central Security Gateway, but not to other Security Gateways in
the community.
Note - Global VPN Communities are not supported in this release.
Item Description
1 Security Gateway
Item Description
1 London Security Gateway
Item Description
6 New York company partner (external network)
This deployment is composed of a Mesh community for London and New York Security Gateways
that share internal networks. The Security Gateways for external networks of company partners
do not have access to the London and New York internal networks. However, the Star VPN
communities let the company partners access the internal networks of the sites that they work
with.
Note - For each VPN gateway, you must configure an existing gateway as a default
gateway.
Examples:
• This rule allows encrypted traffic between domains of member gateways of "community_X."
Name Source Destination VPN Services &
Applications
Allow * Any *Any MyCommunity * Any
traffic
within
community
• This rule allows traffic from all VPN Communities to the internal network on all services.
Name Source Destination VPN Services &
Applications
Allow all * Any Internal_Network * Any * Any
VPN
• This rule allows traffic between two VPN domains with all services.
Name Source Destination VPN Services &
Applications
Site2site Local_VPN_Domain Local_VPN_Domain Site2Site * Any
VPN
Peer_VPN_Domain Peer_VPN_Domain
Where "Meshed community" is the VPN community you have just defined.
There are various scenarios when dealing with externally managed Security Gateways. The
following description tries to address typical cases and assumes that the peers work with
certificates. If this is not the case refer to Configuring a VPN with External Security Gateways
Using a Pre-Shared Secret (see "Configuring a VPN with External Security Gateways Using
Pre-Shared Secret" on page 23).
Note - Configuring a VPN using PKI and certificates is more secure than using
pre-shared secrets.
To configure VPN using certificates, with the external Security Gateways as satellites
in a star VPN Community:
1. Obtain the certificate of the CA that issued the certificate for the peer VPN Security Gateways,
from the peer administrator. If the peer Security Gateway is using the ICA, you can obtain the
CA certificate using a web browser from:
http://<IP address of peer Security Gateway or Management Server>:18264
2. In SmartConsole, define the CA object for the CA that issued the certificate for the peer (see
"Enrolling with a Certificate Authority" on page 66).
3. Define the CA that will issue certificates for your side if the Certificate issued by ICA is not
appropriate for the required VPN tunnel.
You may have to export the CA certificate and supply it to the peer administrator.
4. Define the Network Object(s) of the Security Gateway(s) that are internally managed. In
particular, be sure to do the following:
• In the General Properties page of the Security Gateway object, select IPsec VPN.
• In the Network Management page, define the Topology.
• In the VPN Domain page, define the VPN Domain. If it does not contain all the IP addresses
behind the Security Gateway, define the VPN domain manually by defining a group or
network of machines and setting them as the VPN Domain.
5. If the ICA certificate is not appropriate for this VPN tunnel, then in the IPsec VPN page,
generate a certificate from the relevant CA (see "Enrolling with a Certificate Authority" on
page 66).
6. Define the Network Object(s) of the externally managed Security Gateway(s).
• If it is not a Check Point Security Gateway, define an Interoperable Device: In Object
Explorer, click New > Network Object > More > Interoperable Device.
• If it is a Check Point Security Gateway, define an Externally Managed VPN Gateway: In
Object Explorer, click New > Network Object > Gateways and Servers > More > Externally
Managed VPN Gateway.
7. Set the various attributes of the peer Security Gateway. In particular, be sure to do the
following:
• For an Externally Managed Check Point Security Gateway: In the General Properties page
of the Security Gateway object, select IPsec VPN.
• Define the Topology.
• Define the VPN Domain using the VPN Domain information obtained from the peer
administrator. If the VPN Domain does not contain all the IP addresses behind the Security
Gateway, define the VPN domain manually by defining a group or network of machines and
setting them as the VPN Domain.
• For an Externally Managed Check Point Security Gateway: In the IPsec VPN page, define
the Matching Criteria. Specify that the peer must present a certificate signed by its own CA.
If feasible, enforce details that appear in the certificate as well.
8. Define the Community.
These details assume that a Star Community is used, but you can also use a Meshed
Community. If you are working with a Meshed community, ignore the difference between the
Central Security Gateways and the Satellite Security Gateways.
• Agree with the peer administrator about the various IKE properties and set them in the
Encryption page and the Advanced page of the community object.
• Define the Central Security Gateways. These are usually the internally managed ones. If no
other Community is defined for them, decide whether or not to mesh the central Security
Gateways. If they are already in a Community, do not mesh the central Security Gateways.
• Define the Satellite Security Gateways. These are usually the external ones.
9. Click OK and publish the changes.
10. Define the relevant access rules in the Security Policy.
11. Add the Community in the VPN column, the services in the Service & Applications column, the
desired Action, and the appropriate Track option.
12. Install the Access Control Policy.
Note - Configuring a VPN using PKI and certificates is considered more secure than
using pre-shared secrets.
To configure a VPN using pre-shared secrets, with the external Security Gateways as
satellites in a star VPN Community:
1. Define the Network Object(s) of the Security Gateways that are internally managed. In
particular, be sure to:
• In the General Properties page of the Security Gateway object, in the Network Security tab,
select IPsec VPN.
• In the Network Management page, define the Topology.
• In the Network Management > VPN Domain page, define the VPN Domain. If it does not
contain all the IP addresses behind the Security Gateway, define the VPN domain manually
by defining a group or network of machines and setting them as the VPN Domain.
2. Define the Network Object(s) of the externally managed Security Gateway(s).
• If it is not a Check Point Security Gateway, define an Interoperable Device: In Object
Explorer click New > Network Object > More > Interoperable Device.
• If it is a Check Point Security Gateway, define an Externally Managed VPN Gateway: In
Object Explorer, click New > Network Object > Gateways and Servers > More > Externally
Managed VPN Gateway.
3. Set the various attributes of the peer Security Gateway. In particular, make sure to configure:
• In the Topology page, define the Topology and the VPN Domain using the VPN Domain
information obtained from the peer administrator.
• If the VPN Domain does not contain all the IP addresses behind the Security Gateway,
define the VPN domain manually by defining a group or network of machines and setting
them as the VPN Domain.
4. Define the Community.
The following details assume that a Star Community was chosen, but a Meshed Community is
an option as well. If you are working with a Mesh community, ignore the difference between
the Central Security Gateways and the Satellite Security Gateways.
• Agree with the peer administrator about the various IKE properties and set them in the
Encryption page and the Advanced page of the community object.
• Define the Central Security Gateways. These will usually be the internally managed ones. If
there is no another Community defined for them, decide whether or not to mesh the central
Security Gateways. If they are already in a Community, do not mesh the central Security
Gateways.
• Define the Satellite Security Gateways. These will usually be the external ones.
5. Publish the changes.
6. Agree on a pre-shared secret with the administrator of the external Community members.
Then, in the Shared Secret page of the community, select Use only Shared Secret for all
external members. For each external peer, enter the pre-shared secret.
7. Define the relevant access rules in the Access Control Policy. Add the Community in the VPN
column, the services in the Services & Applications column, the desired Action, and the
appropriate Track option.
8. Install the Security Policy.
The administrator wishes to configure a VPN between Security Gateways A and B by configuring
SmartConsole. To do this, the administrator must install a Policy from the Security Management
Server to the Security Gateways.
1. The Security Management Server successfully installs the Policy on Security Gateway A. As far
as gateway A is concerned, Security Gateways A and B now belong to the same VPN
Community. However, B does not yet have this Policy.
2. The Security Management Server tries to open a connection to Security Gateway B in order to
install the Policy.
3. Security Gateway A allows the connection because of the explicit rules allowing the control
connections, and starts IKE negotiation with Security Gateway B to build a VPN tunnel for the
control connection.
4. Security Gateway B does not know how to negotiate with A because it does not yet have the
Policy. Therefore Policy installation on Security Gateway B fails.
The solution for this is to make sure that control connections do not have to pass through a VPN
tunnel.
Note - Although control connections between the Security Management Server and the
Security Gateway are not encrypted by the community, they are nevertheless encrypted
and authenticated using Secure Internal Communication (SIC).
Overview
In symmetric cryptographic systems, both communicating parties use the same key for encryption
and decryption. The material used to build these keys must be exchanged in a secure fashion.
Information can be securely exchanged only if the key belongs exclusively to the communicating
parties.
The goal of the Internet Key Exchange (IKE) is for both sides to independently produce the same
symmetrical key. This key then encrypts and decrypts the regular IP packets used in the bulk
transfer of data between VPN peers. IKE builds the VPN tunnel by authenticating both sides and
reaching an agreement on methods of encryption and integrity. The outcome of an IKE negotiation
is a Security Association (SA).
This agreement upon keys and methods of encryption must also be performed securely. For this
reason, IKE is composed of two phases. The first phase lays the foundations for the second. Both
IKEv1 and IKEv2 are supported in Security Gateways of version R71 and higher.
Diffie-Hellman (DH) is that part of the IKE protocol used for exchanging the material from which
the symmetrical keys are built. The Diffie-Hellman algorithm builds an encryption key known as a
"shared secret" from the private key of one party and the public key of the other. Since the IPsec
symmetrical keys are derived from this DH key shared between the peers, at no point are
symmetric keys actually exchanged.
IKE Phase I
During IKE Phase I:
• The peers authenticate, either by certificates or via a pre-shared secret. (More authentication
methods are available when one of the peers is a remote access client.)
• A Diffie-Hellman key is created. The nature of the Diffie-Hellman protocol means that both
sides can independently create the shared secret, a key which is known only to the peers.
• Key material (random bits and other mathematical data) as well as an agreement on methods
for IKE phase II are exchanged between the peers.
In terms of performance, the generation of the Diffie-Hellman Key is slow and heavy. The outcome
of this phase is the IKE SA, an agreement on keys and methods for IKE phase II. Figure below
illustrates the process that takes place during IKE phase I.
Note - The exact negotiation stages differ between IKEv1 and IKEv2.
After the IPsec keys are created, bulk data transfer takes place:
Note - IKEv2 is not supported on UTM-1 Edge devices or VSX objects before R75.40VS. If
UTM-1 Edge devices or such VSX objects are included in a VPN Community, the
Encryption setting should be Support IKEv1.
NULL means perform an integrity check only; packets are not encrypted.
A group with more bits ensures a key that is harder to break, but carries a heavy cost in terms of
performance, since the computation requires more CPU cycles.
Phase I modes
Between Security Gateways, there are two modes for IKE phase I. These modes only apply to
IKEv1:
• Main Mode
• Aggressive Mode
If aggressive mode is not selected, the Security Gateway defaults to main mode, performing the
IKE negotiation using six packets; aggressive mode performs the IKE negotiation with three
packets.
Main mode is preferred because:
• Main mode is partially encrypted, from the point at which the shared DH key is known to both
peers.
• Main mode is less susceptible to Denial of Service (DoS) attacks. In main mode, the DH
computation is performed after authentication. In aggressive mode, the DH computation is
performed parallel to authentication. A peer that is not yet authenticated can force processor
intensive Diffie-Hellman computations on the other peer.
Note - Use aggressive mode when a Check Point Security Gateway needs to
negotiate with third party VPN solutions that do not support main mode.
Configure the frequency of IKE and IPsec Security Associations in SmartConsole: VPN Community
Properties > Advanced.
Note - PFS mode is supported only between gateways, not between Security Gateways
and remote access clients.
IP Compression
IP compression is a process that reduces the size of the data portion of the TCP/IP packet. Such a
reduction can cause significant improvement in performance. IPsec supports the Flate/Deflate IP
compression algorithm. Deflate is a smart algorithm that adapts the way it compresses data to
the actual data itself. Whether to use IP compression is decided during IKE phase II. IP
compression is not enabled by default.
IP compression is important for Remote Access client users with slow links.
Security Gateway encryption makes TCP/IP packets appear "mixed up". This kind of data cannot
be compressed and bandwidth is lost as a result. If IP compression is enabled, packets are
compressed before encryption. This has the effect of recovering the lost bandwidth.
If the Security Gateway is configured to Support key exchange for subnets but the option is
unsupported on the remote peer, when host A communicates with host C, a Security Association
(SA 1) will be negotiated between host A's subnet and host C's IP address. The same SA is then
used between any host on the 10.10.11.x subnet and Host C.
When host A communicates with host B, a separate Security Association (SA 2) is negotiated
between host A's subnet and host B. As before, the same SA is then used between any host in
10.10.11.x subnet and Host B.
When Support Key exchange for subnets is not enabled on communicating Security Gateways,
then a security association is negotiated between individual IP addresses; in effect, a unique SA
per host.
• Support IKE DoS protection from unidentified source — The default setting for unidentified
sources is Puzzles. If the Security Gateway is under load, this setting requires the peer to solve
a mathematical puzzle. Solving this puzzle consumes peer CPU resources in a way that makes
it difficult to initiate multiple IKE negotiations simultaneously.
For unidentified sources, Stateless protection may not be sufficient because an attacker may
well control all the IP addresses from which the IKE requests appear to be sent. A third
possible setting is None, which means no DoS protection.
ike_dos_threshold
Values: 0-100. Default: 70. Determines the percentage of maximum concurrent ongoing
negotiations, above which the Security Gateway will request DoS protection. If the threshold is set
to 0, the Security Gateway will always request DoS protection.
ike_dos_puzzle_level_identified_initiator
Values: 0-32. Default: 19. Determines the level of the puzzles sent to known peer Security
Gateways. This attribute also determines the maximum puzzle level a Security Gateway is willing
to solve.
ike_dos_puzzle_level_unidentified_initiator
Values: 0-32. Default: 19. Determines the level of the puzzles sent to unknown peers (such as
Remote Access clients and DAIP Security Gateways). This attribute also determines the
maximum puzzle level that DAIP Security Gateways and Remote Access clients are willing to
solve.
ike_dos_max_puzzle_time_gw
Values: 0-30000. Default: 500. Determines the maximum time in milliseconds a Security Gateway
is willing to spend solving a DoS protection puzzle.
ike_dos_max_puzzle_time_daip
Values: 0-30000. Default: 500. Determines the maximum time in milliseconds a DAIP Security
Gateway is willing to spend solving a DoS protection puzzle.
ike_dos_max_puzzle_time_sr
Values: 0-30000. Default: 5000. Determines the maximum time in milliseconds a client is willing to
spend solving a DoS protection puzzle.
ike_dos_supported_protection_sr
Values: None, Stateless, Puzzles. Default: Puzzles. When downloaded to a client, it controls the
level of protection the client is willing to support.
Security Gateways use the ike_dos_protection_unidentified_initiator property (equivalent to the
SmartConsole Global Property: Support IKE DoS Protection from unidentified Source) to decide
what protection to require from remote clients, but / SecureClient clients use the
ike_dos_protection. This same client property is called ike_dos_supported_protection_sr on the
Security Gateway.
To limit the amount of tunnels that a user can open per IKE, configure the following fields:
Client Properties
Some Security Gateway properties change name when they are downloaded to Remote Access
VPN Clients. The modified name appears in the Userc.C file, as follows:
Property Names
ike_dos_supported_protection_sr ike_dos_protection
ike_dos_puzzle_level_unidentified_initiator ike_dos_acceptable_puzzle_level
ike_dos_max_puzzle_time_sr ike_dos_max_puzzle_time
Encryption Method
• Encryption Method - For IKE phase I and II.
• IKEv2 only - Only support encryption using IKEv2. Security Gateways in this community
cannot access peer gateways that support IKEv1 only.
• Prefer IKEv2, support IKEv1 - If a peer supports IKEv2, the Security Gateway will use
IKEv2. If not, it will use IKEv1 encryption. This is recommended if you have a community of
older and new Check Point Security Gateways.
• IKEv1 only - IKEv2 is not supported.
Encryption Suite
• Use this encryption suite - Select the methods negotiated in IKE phase 2 and used in IPSec
connections. Select and choose the option for best interoperability with other vendors in your
environment.
VPN-A or VPN B - See RFC 4308 for more information.
Suite-B GCM-128 or 256 - See RFC 6379 for more information.
• Custom encryption suite - If you require algorithms other than those specified in the other
options, select the properties for IKE Phase 1, including which Diffie-Hellman group to use.
Also, select properties for IKE Phase 2.
Note - Suite-B GCM-128 and 256 encryption suites are supported on R71.50 gateways and
from R75.40 gateways.
If there is a Dynamic IP Gateway inside the community, R77.30 (or lower) community member
gateways that respond to its IKE negotiation, use the configuration defined in Global Properties >
Remote Access > VPN -Authentication and Encryption.
More
• Use aggressive mode (Main mode is the default) - Select only if the peer only supports
aggressive mode. This is only supported with IKEv1.
• Use Perfect Forward Secrecy, and the Diffie-Hellman group - Select if you need extremely
high security.
• Support IP compression - Select to decrease bandwidth consumption and for interoperability
with third party peers configured to use IP Compression.
IKE (Phase 1)
When to renegotiate the IKE Security Associations.
IKE (Phase 2)
When to renegotiate the IPsec security associations. This sets the expiration time of the IPsec
encryption keys.
NAT
Disable NAT inside the VPN community - Select to not apply NAT for the traffic while it passes
through IPsec tunnels in the community.
Reset
Reset all VPN properties to the default.
Link Selection
In This Section:
Link Selection Overview ...............................................................................................39
Configuring IP Selection by Remote Peer ...................................................................39
Configuring Outgoing Route Selection ........................................................................42
Configuring Source IP Address Settings .....................................................................44
Outgoing Link Tracking ................................................................................................45
Link Selection Scenarios ..............................................................................................45
Service Based Link Selection .......................................................................................48
Trusted Links ................................................................................................................53
On Demand Links (ODL) ...............................................................................................55
Link Selection and ISP Redundancy ............................................................................57
Link Selection with non-Check Point Devices.............................................................59
Note that if one time probing is configured, the VPN tunnel will stay on the first chosen IP
address until the next time policy is installed. See ongoing probing and onetime probing
methods below.
• Load Sharing
In Load Sharing mode the encrypted traffic is distributed among all available links. Every new
connection ready for encryption uses the next available link in a round robin manner. When a
link becomes unavailable, all of its connections are distributed among the other available
links. A link's availability is determined using RDP probing.
The peer Security Gateway that responds to the connection will route the reply traffic through
the same route that it was received on, as long as that link is available.
Although the VPN tunnel traffic can be routed through multiple links in Load Sharing mode,
only one VPN tunnel is generated. IKE sessions are arbitrarily routed though one of the
available links.
Load Sharing is supported on Security Gateways of version R71 and higher. If a Security
Gateway of version R71 or higher is configured to use the Load Sharing redundancy mode,
Security Gateways of versions before R71 will use the High Availability redundancy mode when
routing traffic to the R71 or higher Security Gateways.
Load Sharing is supported on all platforms for incoming traffic. For outgoing traffic, VPN
traffic between peers with Load Sharing configuration is not accelerated by IPSO acceleration
devices. Load Sharing is not supported on UTM-1 Edge devices.
Probing Settings:
Additional settings related to probing are set in Link Selection > IP Selection by Remote Peer >
Use probing > Configure > Probing Settings
• Probe all addresses defined in the topology tab - choose to include all addresses defined in
the topology tab for the Security Gateway in the probing
• Probe the following addresses - Specify the addresses that you want to include in the probing.
• Primary address -Optionally, to choose a primary address, select the check box and choose
one of the included IP addresses from the drop down menu as the Primary Address. A primary
IP address is only used with the High Availability probing mode. If Load Sharing is configured,
the primary address is ignored. Enabling a primary IP address has no influence on the IP
selected for outgoing VPN traffic. If the remote Security Gateway connects to a peer Security
Gateway that has a primary IP address defined, then the remote Security Gateway will connect
to the primary address (if active) regardless of network speed (latency) or route metrics.
• Use probing method
Choose one of the following probing methods.
• Using ongoing probing (default setting) - When a session is initiated, all possible
destination IP addresses continuously receive RDP packets. The RDP probing is activated
when a connection is opened and continues as a background process.
• Using one time probing - When a session is initiated, all possible destination IP addresses
receive an RDP session to test the route. These results are used until the next time that a
policy is installed.
Note - UDP RDP packets are not encrypted. The RDP mechanism only tests
connectivity.
For L2 links, there must be routes to the peer's encryption domains through the local L2
interface device.
In this scenario, Security Gateway A has two external interfaces, 192.168.10.10 and 192.168.20.10.
Peer Security Gateway B also has two external interfaces: 192.168.30.10 and 192.168.40.10.
If all routes for outgoing traffic from Security Gateway A are available, the route from
192.168.10.10 to 192.168.40.10 has the lowest metric (highest priority) and is therefore the
preferred route.
How do peer Security Gateways select an IP address on the local Security Gateway for VPN traffic?
Since there is only one interface available for VPN, to determine how remote peers determine the
IP address of the local Security Gateway, select the following from the IP Selection by Remote
Peer section of the Link Selection page:
• Select Main address or choose an IP address from the Selected address from topology table
drop down menu.
• If the IP address is located behind a static NAT device, select Statically NATed IP.
Site to Site VPN Administration Guide R80.10 | 45
Link Selection
The local Security Gateway has two IP addresses used for VPN. One interface is used for VPN with
a peer Security Gateway A and one interface for peer Security Gateway B.
To determine how peer Security Gateways discover the IP address of the local Security Gateway,
enable one-time probing with High Availability redundancy mode. Since only one IP is available
for each peer Security Gateway, probing only has to take place one time.
To determine how peer Security Gateways discover the IP address of the local Security Gateway,
use ongoing probing with High Availability redundancy mode. In order for the Static NAT IP
address to be probed, it must be added to the Probe the following addresses list in the Probing
Settings window.
To utilize both external interfaces by distributing VPN traffic among all available links, use the
Probing redundancy mode of Load Sharing on both Security Gateways. You can also specify that
only certain external interfaces should be probed by putting only those interfaces in the Probe the
following addresses list in the Probing Settings window. If one link goes down, traffic will
automatically be rerouted through the other link.
To enable this configuration, make sure that your routing table allows packet flow back and forth
between both eth0 interfaces and packet flow back and forth between both eth1 interfaces. Then
Link Selection can reroute the VPN traffic between these available links.
To utilize both external interfaces and distribute VPN traffic between the available links, use the
Probing redundancy mode of Load Sharing on the local Security Gateway. Then the peer Security
Gateway will distribute its outgoing VPN traffic between interfaces eth0 and eth1 of the local
Security Gateway.
If the default, Operating system routing table, setting in the Outgoing Route Selection section is
selected, the local Security Gateway will only use one of its local interfaces for outgoing VPN
traffic; the route with the lowest metric and best match to reach the single IP address of the peer
Security Gateway, according to the routing table.
If you want to distribute the outgoing VPN traffic on both outbound links from the local Security
Gateway as well, select Route Based Probing in the Outgoing Route Selection on the Link
Selection page of the local Security Gateway.
It is possible to configure the traffic of a specific service not to fail over. In this case, traffic of the
configured service will only be routed through interfaces assigned to this service, even if these
interfaces stop responding to RDP.
If the same service is assigned to more than one interface, this service's traffic is distributed
between the configured interfaces. Every new outgoing encrypted connection uses the next
available link in a round robin manner.
All traffic from services that are not assigned to a specific interface is distributed among the
remaining interfaces. If all links through these interfaces are down, the traffic is distributed
among the interfaces that are configured for specific services.
Service Based Link Selection configuration requires enabling the following features:
• IP Selection by Remote Peer – Load Sharing probing mode
• Outgoing Route Selection – Route based probing
• Service Based Link Selection configuration file on the management server
Service Based Link Selection is supported on Security Gateways of version R71 and higher. It is
supported on the SecurePlatform, Gaia, Linux, and IPSO platforms. VPN traffic between peers
with Service Based Link Selection configuration is not accelerated by IPSO acceleration devices.
Service Based Link Selection is not supported on UTM-1 Edge devices.
In this example, interface eth1 of both Security Gateways is dedicated to HTTP and FTP traffic. All
other traffic is routed to interface eth0.
If the available link through eth1 stops responding to RDP probing, HTTP and FTP traffic will fail
over to eth0. It is possible to specify that HTTP and FTP traffic should only be routed through eth1
even if the link through eth1 stops responding. Specify this by including the dont_failover flag
when editing the Service Based Link Selection configuration file.
All other traffic that is not HTTP or FTP will be routed through eth0. If the link through eth0 stops
responding to RDP probing, all traffic will be routed through eth1.
The Service Based Link Selection configuration file for this environment should appear as follows:
Alternatively, in SmartConsole, you can create a Services Group that includes HTTP and FTP
services. In the example below, this group is called http_ftp_grp. Using this group, the Service
Based Link Selection configuration file for this environment should appear as follows:
To utilize all three external interfaces and distribute the VPN traffic among the available links,
Link Selection Load Sharing and Route based probing should be enabled. To control your
bandwidth use, dedicate one or more links to a specific service or services using Service Based
Link Selection. In this scenario, interfaces eth0 and eth1 of both Security Gateways are dedicated
to SIP traffic. SIP traffic is distributed between eth0 and eth1. All other traffic is routed through
eth2.
If either the link through eth0 or the link through eth1 stops responding to RDP probing, SIP traffic
will fail over to the other SIP interface. If the link through eth2 stops responding to RDP probing,
all traffic will be routed though eth0 or eth1.
To utilize all external interfaces and distribute the VPN traffic among the available links, Link
Selection Load Sharing and Route based probing should be enabled on the local Security Gateway,
London_GW. To control your bandwidth use, dedicate interface eth1 of the local Security Gateway
to HTTP and FTP traffic using Service Based Link Selection. The local Security Gateway will route
outgoing HTTP and FTP connections through interface eth1. All other traffic, not HTTP or FTP, will
be routed through eth0.
In this scenario, HTTP and FTP traffic should not fail over. HTTP and FTP traffic should only be
routed through interface eth1, even if the link through interface eth1 stops responding to RDP
probing. This is configured by specifying the dont_failover flag.
The Service Based Link Selection configuration file for this environment should appear as follows:
Since the Service Based Link Selection configuration is only relevant for outgoing traffic of the
local Security Gateway, the peer Security Gateway can send HTTP and FTP traffic to either
interface of the local Security Gateway. The outgoing VPN traffic of the peer Security Gateway is
distributed between interfaces eth0 and eth1 of the local Security Gateway.
Trusted Links
Trusted Links allows you to set an interface as "trusted" for VPN traffic so that traffic sent on that
link will not be encrypted. You may want to set up a trusted link if you are confident that the link is
already encrypted and secure and you do not need a second encryption.
If you configure an interface as trusted, traffic routed through that interface will be sent
unencrypted, while traffic sent through other interfaces will still be encrypted.
Trusted interfaces should be configured symmetrically on the local and peer Security Gateways. If
only one side of the link is configured as trusted for VPN traffic, clear traffic received by a
non-trusted interface will be dropped by the peer Security Gateway.
If you have configured a specific link as trusted for VPN traffic and you are using probing, the
probing method considers all links, including the trusted link, when choosing a link for a
connection.
The probing method chooses the link according to these criteria:
• The configured redundancy mode, High Availability or Load Sharing
• If Service Based Link Selection is configured.
If the trusted link is chosen for a connection, the traffic is not encrypted. If another, non-trusted,
link is chosen, the traffic is encrypted.
In an MEP configuration, trusted links are only supported for connections initiated by a peer
Security Gateway to a MEP Security Gateway. Unencrypted VPN connections routed through a
trusted interface and initiated by a MEP Security Gateway may be dropped by the peer Security
Gateway.
Trusted links are not supported in Traditional mode. In Traditional mode, trusted link settings are
ignored and VPN traffic is always encrypted.
Trusted links are supported on Security Gateways of version R71 and higher.
Note - Trusted links are not supported by IPSO acceleration devices. IPSO
acceleration devices ignore trusted links settings and will encrypt traffic routed
through these links.
If the probing redundancy mode is High Availability and the trusted link is configured as the
Primary IP address, the trusted link will be used for VPN traffic. If the trusted link stops
responding to RDP probing, the link through Interface eth0 will be used for VPN traffic and traffic
will be encrypted.
If the probing redundancy mode is Load Sharing, the VPN traffic will be distributed between the
available links. Connections routed through interface eth0 will be encrypted while connections
routed through the trusted link will not be encrypted.
SIP traffic is routed through the trusted link between the two eth1 interfaces and will not be
encrypted. If the trusted link stops responding to RDP probing, SIP traffic will be routed through
the eth0 interfaces and will be encrypted.
All other traffic that is not SIP is encrypted and routed through the interface eth0 link. However, if
interface eth0 stops responding to RDP probing, all the traffic will be routed through the trusted
link and will not be encrypted.
The Security Gateway has two external links for Internet connectivity: one to an ISP, the other to
an ISDN dialup. The ISDN dialup connection is configured as an On Demand Link.
On the Security Gateway, the Route Based Probing mechanism probes all of the non-On Demand
Links and selects the active link with the lowest metric. In this case, it probed the ISP link. A script
is run to activate the On Demand Link when all other links with higher priorities become
unavailable. When the link becomes available again, a shutdown script is run automatically and
the connection continues through the link with the ISP.
Note - On Demand Links are probed only once using a single RDP session. Fail over
between On Demand Links is not supported.
Property Description
use_on_demand_links Enables on-demand links. The default is FALSE. Change to
TRUE.
on_demand_metric_min Defines the minimum metric level for an on-demand link. This
value must be equal to or higher than the configured minimum
metric.
on_demand_initial_script The name of the on-demand script, which runs when all
not-on-demand routes stop responding. Put the script in the
$FWDIR/conf directory.
on_demand_shutdown_script This script is run when the failed links become available. Put the
script in the $FWDIR/conf directory.
If you do not want to use GuiDBedit, you can configure the use_on_demand_links and
on_demand_metric_min commands in SmartConsole:
1. In SmartConsole, click Menu > Global Properties > Advanced > Configure.
2. In VPN Advanced Properties, click Link Selection.
3. Click use_on_demand_links to enable On Demand Links.
4. Set the minimum metric level for an On Demand Link next to the on_demand_metric_min
command.
traffic and High Availability for VPN traffic, or if you want to use different primary ISPs for firewall
and VPN traffic.
In the Topology > ISP Redundancy window, configure the ISP Redundancy settings, such as ISP
Links and Redundancy mode. The ISP Redundancy settings are applied by default to VPN traffic.
The derived Link Selection settings are visible in the IPsec VPN > Link Selection window.
In the following scenario, the Apply settings to VPN traffic on the ISP Redundancy page was
cleared and there are different setting configured for Link Selection and ISP Redundancy.
In this scenario:
• Security Gateways A, B, and C each have two interfaces configured as ISP links.
• ISP Redundancy is configured on Security Gateway A.
• Security Gateway A should use ISP 1 in order to connect to Security Gateway B and ISP 2 in
order to connect to Security Gateway C. If one of the ISP links becomes unavailable, the other
ISP should be used.
In this scenario, the administrator of Security Gateway A needs to:
• Clear the Apply settings to VPN traffic box in the ISP Redundancy window.
• Reconfigure the Outgoing Route Selection to Route Based Probing in the Link Selection
window.
• Configure the routing table so that ISP 1 is the highest priority for peer Security Gateway B and
ISP 2 has the highest priority for peer Security Gateway C.
• Load Sharing and Service Based Link Selection do not work with non-Check Point gateways. If
Load Sharing or Service Based Link Selection is enabled on the local Security Gateway, but the
peer is a non-Check Point device, the local Security Gateway will only use one link to the
non-Check Point device: the best match (highest prefix length) link with the lowest metric.
• If Route based probing is selected as the Outgoing Route Selection method, for VPN traffic to
a non-Check Point device, the local Security Gateways will always use the best match (highest
prefix length) link with the lowest metric.
Security Management Server A issues certificates for Security Management Server B that issues
certificates for Security Gateway B.
Security Gateways A and B receive their certificates from a PKI service provider accessible via the
web. Certificates issued by external CA's may be used by Security Gateways managed by the same
Security Management Server to verification.
Trusting An External CA
A trust relationship is a crucial prerequisite for establishing a VPN tunnel. However, a trust
relationship is possible only if the CA that signs the peer's certificate is "trusted." Trusting a CA
means obtaining and validating the CA's own certificate. Once the CA's Certificate has been
validated, the details on the CA's certificate and its public key can be used to both obtain and
validate other certificates issued by the CA.
The Internal CA (ICA) is automatically trusted by all modules managed by the Security
Management Server that employs it. External CAs (even the ICA of another Check Point Security
Management Server) are not automatically trusted, so a module must first obtain and validate an
external CA's certificate. The external CA must provide a way for its certificate to be imported into
the Security Management Server.
If the external CA is:
• The ICA of an external Security Management Server, see the R80.10 Security Management
Server Administration Guide http://downloads.checkpoint.com/dc/download.htm?ID=54842 for
further information
• An OPSEC Certified CA, use the CA options on the Servers and OSPEC Applications tab to
define the CA and obtain its certificate
Validation of a Certificate
When an entity receives a certificate from another entity, it must:
1. Verify the certificate signature, i.e. verify that the certificate was signed by a trusted CA. If the
certificate is not signed directly by a trusted CA, but rather by a subsidiary of a trusted CA, the
path of CA certificates is verified up to the trusted CA.
2. Verify that the certificate chain has not expired.
3. Verify that the certificate chain is not revoked. A CRL is retrieved to confirm that the serial
number of the validated certificate is not included among the revoked certificates.
In addition, VPN verifies the validity of the certificate's use in the given situation, confirming that:
• The certificate is authorized to perform the required action. For example, if the private key is
needed to sign data (e.g., for authentication) the KeyUsage extension on the certificate – if
present – is checked to see if this action is permitted.
• The peer used the correct certificate in the negotiation. When creating a VPN tunnel with an
externally managed module, the administrator may decide that only a certificate signed by a
specific CA from among the trusted CAs can be accepted. (Acceptance of certificates with
specific details such as a Distinguished Name is possible as well).
Revocation Checking
There are two available methods useful in determining the status of a certificate:
1. CRL
2. Online Certificate Status Protocol (OCSP)
Adding the object IP as Alternate name extension can be configured as a default setting by
selecting in Menu > Global Properties > Advanced > Configure > Certificates and PKI
properties, the options:
add_ip_alt_name_for_opsec_certs
add_ip_alt_name_for_ICA_certs
The configuration in this step is also applicable for Internal CAs.
9. Click OK.
The public key and the DN are then used to DER-encode a PKCS#10 Certificate Request.
10. After the Certificate Request is ready, click View.
The Certificate Request View window appears with the encoding.
11. Copy the whole text in the window and deliver it to the CA.
The CA administrator must now complete the task of issuing the certificate. Different CAs
provide different ways of doing this, such as an advanced enrollment form (as opposed to the
regular form for users). The issued certificate may be delivered in various ways, for example
email. After the certificate has arrived, it needs to be stored:
a) In Object Explorer (Ctrl+E), go to the Servers category and select the CA object.
b) Open the OPEC PKI tab, click Get and browse to the location in which the certificate was
saved.
c) Select the appropriate file and verify the certificate details.
d) Close object and save.
9. On the VPN tab of the network object, select the appropriate certificate in the Certificates List,
and click Complete...
10. Browse to the folder where you stored the issued certificate, select the certificate and verify
the certificate details.
11. Close the network object and Save.
CRL
VPN can retrieve the CRL from either an HTTP server or an LDAP server. If the CRL repository is
an HTTP server, the module uses the URL published in the CRL Distribution Point extension on
the certificate and opens an HTTP connection to the CRL repository to retrieve the CRL.
If the CRL repository is an LDAP server, VPN attempts to locate the CRL in one of the defined
LDAP account units. In this scenario, an LDAP account unit must be defined. If the CRL
Distribution Point extension exists, it publishes the DN of the CRL, namely, the entry in the
Directory under which the CRL is published or the LDAP URI. If the extension does not exist, VPN
attempts to locate the CRL in the entry of the CA itself in the LDAP server.
OCSP
Online Certificate Status Protocol (OCSP) enables applications to identify the state of a certificate.
OCSP may be used for more timely revocation information than is possible with CRLs and may
also be used to obtain additional status information. When OCSP client issues a status request to
an OCSP server, acceptance of the certificate in question is suspended until the server provides a
response.
In order to use OCSP, the root CA must be configured to use this method instead of CRL. This
setting is inherited by the subordinate CA's.
CRL Prefetch-Cache
Since the retrieval of CRL can take a long time (in comparison to the entire IKE negotiation
process), VPN stores the CRLs in a CRL cache so that later IKE negotiations do not require
repeated CRL retrievals.
The cache is pre-fetched:
• every two hours
• on policy installation
• when the cache expires
If the pre-fetch fails, the previous cache is not erased.
An administrator can shorten the lifetime of a CRL in the cache or even to cancel the use of the
cache. If the CRL Cache operation is canceled, the CRL must be retrieved for each subsequent IKE
negotiation, thus considerably slowing the establishment of the VPN tunnel. Because of these
performance implications, we recommend that you only disable CRL caching when the level of
security demands continuous CRL retrieval.
DKM is supported for all enrollment methods, and can be configured as a default setting by
selecting in Global Properties > SmartConsole Customization > Configure > Certificates and PKI
properties, the option: use_dkm_cert_by_default
Note - Generating certificates for Edge devices does not support DKM and will be
generated locally on the management even if use_dkm_cert_by_default is
configured.
Trusting an ICA
A VPN module automatically trusts the ICA of the Security Management Server that manages it.
No further configuration is required.
Note - In case of SCEP automatic enrollment, you can skip this stage and fetch the
CA certificate automatically after configuring the SCEP parameters.
The CA's Certificate must be retrieved either by downloading it using the CA options in the
Certificate Authority object, or by obtaining the CA's certificate from the peer administrator in
advance.
Note - A Security Gateway can have only one certificate signed by one CA. When the new
certificate is issued, you will be asked to replace the existing certificate signed by the
same CA.
CA Certificate Rollover
CA Certificate Rollover is a VPN feature that enables rolling over the CA certificates used to sign
client and Security Gateway certificates for VPN traffic, without risk of losing functionality at
transition.
To achieve a gradual CA certificate rollover, CA Certificate Rollover enables VPN support for
multiple CA certificates generated by third-party OPSEC-compliant CAs, such as Microsoft
Windows CA. By using multiple CA certificates, you can gradually rollover client and Security
Gateway certificates during a transitional period when client and Security Gateway certificates
signed by both CA certificates are recognized.
When a certificate is added to a CA that already has a certificate, the new certificate is defined as
Additional and receives an index number higher by one than the highest existing certificate index
number. The original certificate is defined as Main.
Only additional certificates can be removed. CA Certificate Rollover provides tools for adding and
removing certificates, and for changing the status of a certificate from additional to main and from
main to additional.
CA Certificate Rollover is for rolling over CA certificates with different keys. To add a CA certificate
using the same key as the existing CA certificate (for example, to extend its expiration date), just
Get the certificate from the OPSEC PKI tab of the CA properties, and do not use CA Certificate
Rollover.
Configuring OCSP
To use OCSP, you must configure the CA object to use the OCSP revocation information method
instead of the CRL method.
Use GuiDBedit to change the value of the field ocsp_validation to true. When set to true, the CA
uses OCSP to make sure that certificates are valid. This is configured on the root CA and is
inherited by the subordinate CAs.
Item Description
A Security Gateway A
B Security Gateway B
C Security Gateway C
Consider a simple VPN routing scenario consisting of Center gateway (hub) and two Satellite
gateways (spokes). All machines are controlled from the same Security Management Server, and
all the Security Gateways are members of the same VPN community. Only Telnet and FTP services
are to be encrypted between the Satellites and routed through the Center:
Although this can be done easily in a VPN star community, the same goal can be achieved by
editing vpn_route.conf:
In this instance, Spoke_B_VPN_Dom is the name of the network object group that contains spoke
B's VPN domain. Hub C is the name of the Security Gateway enabled for VPN routing.
Spoke_A_VPN_Dom is the name of the network object that represents Spoke A's encryption
domain. For an example of how the file appears:
For the two VPN star communities, based around Hubs A and B:
• Spokes A1 and A2 need to route all traffic going outside of the VPN community through Hub A
• Spokes A1 and A2 also need to route all traffic to one another through Hub A, the center of
their star community
• Spoke B needs to route all traffic outside of its star community through Hub B
A_community is the VPN community of A plus the spokes belonging to A. B_community is the VPN
community. Hubs_community is the VPN community of Hub_A and Hub_B.
Spokes A1 and A2 are combined into the network group object "A_spokes". The appropriate rule in
the Security Policy Rule Base looks like this:
The appropriate rule in the Security Policy Rule Base looks like this:
In this scenario:
• There is a VTI connecting Cluster GWA and GWb
• There is a VTI connecting Cluster GWA and GWc
• There is a VTI connecting GWb and GWc
A virtual interface behaves like a point-to-point interface directly connected to the remote peer.
Traffic between network hosts is routed into the VPN tunnel using the IP routing mechanism of
the Operating System. Security Gateway objects are still required, as well as VPN communities
(and access control policies) to define which tunnels are available. However, VPN encryption
domains for each peer Security Gateway are no longer necessary. The decision whether or not to
encrypt depends on whether the traffic is routed through a virtual interface. The routing changes
dynamically if a dynamic routing protocol (OSPF/BGP) is available on the network.
When a connection that originates on GWb is routed through a VTI to GWc (or servers behind GWc)
and is accepted by the implied rules, the connection leaves GWb in the clear with the local IP
address of the VTI as the source IP address. If this IP address is not routable, return packets will
be lost.
The solution for this issue is:
• Configure a static route on GWb that redirects packets destined to GWc from being routed
through the VTI
• Not including it in any published route
• Adding route maps that filter out GWc's IP addresses
Having excluded those IP addresses from route-based VPN, it is still possible to have other
connections encrypted to those addresses (i.e. when not passing on implied rules) by using
domain based VPN definitions.
The VTI can be configured in two ways:
• Numbered
• Unnumbered
Numbered VTI
You configure a local and remote IP address for each numbered VPN Tunnel Interface (VTI). For
each Security Gateway, you configure a local IP address, a remote address, and the local IP
address source for outbound connections to the tunnel. The remote IP address must be the local
IP address on the remote peer Security Gateway. More than one VTI can use the same IP Address,
but they cannot use an existing physical interface IP address.
Unnumbered VTI
For unnumbered VTIs, you define a proxy interface for each Security Gateway. Each Security
Gateway uses the proxy interface IP address as the source for outbound traffic. Unnumbered
interfaces let you assign and manage one IP address for each interface. Proxy interfaces can be
physical or loopback interfaces.
A VTI connects:
• Cluster GWA and GWb
• Cluster GWA and GWc
• GWb and GWc
The devices in this scenario are:
ClusterXL:
• Cluster GWA
• member_GWA1
• member_GWA2
VPN Modules:
• GWb
• GWc
IP Configurations:
• Cluster GWA
• member_GWA1
• External Unique IP eth0: 170.170.1.1/24
• External VIP eth0: 170.170.1.10/24
• Sync Interface eth1: 5.5.5.1/24
Site to Site VPN Administration Guide R80.10 | 83
Route Based VPN
When configuring a VTI in a clustered environment and an interface name is not specified, a name
is provided. The default name for a VTI is "vt-[peer Security Gateway name]". For example, if the
peer Security Gateway's name is Server_2, the default name of the VTI is 'vt-Server_2'. For peer
Security Gateways that have names that are longer than 12 characters, the default interface name
is the last five characters plus a 7 byte hash of the peer name calculated to the give the interface a
unique name.
After configuring the VTIs on the cluster members, you must configure in the SmartConsole the
VIP of these VTIs.
In SmartConsole:
1. In the Gateways & Servers view, edit the Check Point Cluster.
2. In Network Management window, click Get Interfaces.
The VTIs are shown in the Topology column as Point to point.
Interfaces are members of the same VTI if these criteria match:
• Remote peer name
• Remote IP address
• Interface name
3. Configure the VTI VIP. Select the interface and click Edit. Edit the interface in the General page
of the interface object.
4. Click OK and install policy.
Configuring GWb
--------- Access the VPN shell Command Line Interface
[GWb]# vpn shell
? - This help
.. - Go up one level
quit - Quit
[interface ] - Manipulate tunnel interfaces
[show ] - Show internal data
[tunnels ] - Manipulate tunnel data
--------- Add vt-GWa
VPN shell:[/] > /interface/add/numbered 10.0.0.2 10.0.1.10 GWa
Interface 'vt-GWa' was added successfully to the system
--------- Add vt-GWc
VPN shell:[/] > /interface/add/numbered 10.0.0.2 10.0.0.3 GWc
Interface 'vt-GWc' was added successfully to the system
---------- Verify configuration
VPN shell:[/] > /show/interface/detailed all
vt-GWa Type:numbered MTU:1500
inet addr:10.0.0.2 P-t-P:10.0.1.10 Mask:255.255.255.255
The following tables illustrate how the OSPF dynamic routing protocol is enabled on VTIs both for
single members and for cluster members using SecurePlatform. Note that the network
commands for single members and cluster members are not the same.
For more information on advanced routing commands and syntaxes, see the Check Point
Advanced Routing Suite - Command Line Interface book.
To learn about enabling dynamic routing protocols on VTIs in Gaia environments, see VPN Tunnel
Interfaces in the R80.10 Gaia Administration Guide
http://downloads.checkpoint.com/dc/download.htm?ID=54824.
When peering with a Cisco GRE enabled device, a point to point GRE tunnel is required. Use the
following command to configure the tunnel interface definition:
[Expert@member_GWa1]# cligated
localhost>enable
localhost#configure terminal
--------- Enable OSPF and provide an OSPF router ID
localhost(config)#router ospf 1
localhost(config-router-ospf)#router-id 170.170.1.10
--------- Define interfaces/IP's on which OSPF runs (Use the cluster IP as
defined in topology) and the area ID for the interface/IP
localhost(config-router-ospf)#network 10.0.1.10 0.0.0.0 area 0.0.0.0
localhost(config-router-ospf)#network 10.0.1.20 0.0.0.0 area 0.0.0.0
--------- Redistribute kernel routes (this is only here as an example, please
see the dynamic routing book for more specific commands concerning
redistribution of routes)
Site to Site VPN Administration Guide R80.10 | 88
Route Based VPN
localhost(config-router-ospf)#redistribute kernel
localhost(config-router-ospf)#exit
localhost(config)#exit
-------- Write configuration to disk
localhost#write memory
IU0 999 Configuration written to '/etc/gated.ami'
localhost#quit
[Expert@member_GWa2]# cligated
localhost>enable
localhost#configure terminal
--------- Enable OSPF and provide an OSPF router ID
localhost(config)#router ospf 1
localhost(config-router-ospf)#router-id 170.170.1.10
--------- Define interfaces/IP's on which OSPF runs (Use the cluster IP as
defined in topology) and the area ID for the interface/IP
localhost(config-router-ospf)#network 10.0.1.10 0.0.0.0 area 0.0.0.0
localhost(config-router-ospf)#network 10.0.1.20 0.0.0.0 area 0.0.0.0
--------- Redistribute kernel routes (this is only here as an example, please
see the dynamic routing book for more specific commands concerning
redistribution of routes)
localhost(config-router-ospf)#redistribute kernel
localhost(config-router-ospf)#exit
localhost(config)#exit
-------- Write configuration to disk
localhost#write memory
IU0 999 Configuration written to '/etc/gated.ami'
localhost#quit
[Expert@GWb]# cligated
localhost>enable
localhost#configure terminal
--------- Enable OSPF and provide an OSPF router ID
localhost(config)#router ospf 1
localhost(config-router-ospf)#router-id 180.180.1.1
--------- Define interfaces/IP's on which OSPF runs (Use the cluster IP as
defined in topology) and the area ID for the interface/IP
localhost(config-router-ospf)#network 10.0.1.10 0.0.0.0 area 0.0.0.0
localhost(config-router-ospf)#network 10.0.0.3 0.0.0.0 area 0.0.0.0
--------- Redistribute kernel routes (this is only here as an example, please
see the dynamic routing book for more specific commands concerning
redistribution of routes)
localhost(config-router-ospf)#redistribute kernel
localhost(config-router-ospf)#exit
localhost(config)#exit
-------- Write configuration to disk
localhost#write memory
IU0 999 Configuration written to '/etc/gated.ami'
localhost#quit
[Expert@GWc]# cligated
localhost>enable
localhost#configure terminal
--------- Enable OSPF and provide an OSPF router ID
localhost(config)#router ospf 1
localhost(config-router-ospf)#router-id 190.190.1.1
--------- Define interfaces/IP's on which OSPF runs (Use the cluster IP as
defined in topology) and the area ID for the interface/IP
localhost(config-router-ospf)#network 10.0.1.20 0.0.0.0 area 0.0.0.0
localhost(config-router-ospf)#network 10.0.0.2 0.0.0.0 area 0.0.0.0
--------- Redistribute kernel routes (this is only here as an example, please
see the dynamic routing book for more specific commands concerning
redistribution of routes)
localhost(config-router-ospf)#redistribute kernel
localhost(config-router-ospf)#exit
localhost(config)#exit
-------- Write configuration to disk
localhost#write memory
IU0 999 Configuration written to '/etc/gated.ami'
localhost#quit
Note - For VTIs between Gaia gateways and Cisco GRE gateways: You must manually
configure hello/dead packet intervals at 10/40 on the Gaia gateway, or at 30/120 on the
peer gateway. If not, OSPF will not get into Full state.
Tunnel Management
In This Section:
Overview of Tunnel Management ................................................................................93
Permanent Tunnels ......................................................................................................93
VPN Tunnel Sharing .....................................................................................................96
Configuring Tunnel Features .......................................................................................97
Permanent Tunnels
As companies have become more dependent on VPNs for communication to other sites,
uninterrupted connectivity has become more crucial than ever before. Therefore it is essential to
make sure that the VPN tunnels are kept up and running. Permanent Tunnels are constantly kept
active and as a result, make it easier to recognize malfunctions and connectivity problems.
Administrators can monitor the two sides of a VPN tunnel and identify problems without delay.
Each VPN tunnel in the community may be set to be a Permanent Tunnel. Since Permanent
Tunnels are constantly monitored, if the VPN tunnel is down, then a log, alert, or user defined
action, can be issued. A VPN tunnel is monitored by periodically sending "tunnel test" packets. As
long as responses to the packets are received the VPN tunnel is considered "up." If no response is
received within a given time period, the VPN tunnel is considered "down." Permanent Tunnels can
only be established between Check Point Security Gateways. The configuration of Permanent
Tunnels takes place on the community level and:
• Can be specified for an entire community. This option sets every VPN tunnel in the community
as permanent.
• Can be specified for a specific Security Gateway. Use this option to configure specific Security
Gateways to have permanent tunnels.
• Can be specified for a single VPN tunnel. This feature allows configuring specific tunnels
between specific Security Gateways as permanent.
Optional Configuration
• IKE Initiation Prevention - By default, when a valid IKE SA is not available, a DPD request
message triggers a new IKE negotiation. To prevent this behavior, set the property
dpd_allowed_to_init_ike to false.
Edit the property in GuiDBedit under Network Objects > network_objects > <gateway Name>
> VPN.
• Delete IKE SAs for dead peer - Based on RFC 3706, a VPN gateway has to delete IKE SAs from
a dead peer. This functionality is enabled, by default.
To disable this feature, set the DPD_DONT_DEL_SA environment variable to 0:
• To do this temporarily, run:
cpstop
export DPD_DONT_DEL_SA=0
cpstart
• To do this permanently:
(i) Add this line to the $CPDIR/tmp/.CPprofile.sh file:
DPD_DONT_DEL_SA=0 ; export DPD_DONT_DEL_SA
(ii) Reboot
Note: To re-enable the feature, remove the DPD_DONT_DEL_SA environment variable.
Permanent Tunnels
In the Star Community or Meshed community object, on the Tunnel Management page, select Set
Permanent Tunnels. These are the options:
• On all tunnels in the community
• On all tunnels of specific Security Gateways
• On specific tunnels in the community
To configure all tunnels as permanent, select On all tunnels in the community. Clear this option
to terminate all Permanent Tunnels in the community.
Tracking Options
You can configure alerts to stay updated on the status of permanent VPN tunnels.
RIM can only be enabled when permanent tunnels are configured for the community. Permanent
tunnels are kept alive by tunnel test packets. When a Security Gateway fails to reply, the tunnel
will be considered 'down.' As a result, RIM will delete the route to the failed link from the local
routing table, which triggers neighboring dynamic routing enabled devices to update their routing
information accordingly. This will result in a redirection of all traffic destined to travel across the
VPN tunnel, to a pre-defined alternative path.
There are two possible methods to configure RIM:
• Automatic RIM - RIM automatically injects the route to the encryption domain of the peer
Security Gateways.
• Custom Script - Specify tasks for RIM to perform according to specific needs.
Route injection can be integrated with MEP functionality (which route return packets back through
the same MEP Security Gateway). For more information on MEP, see Multiple Entry Point VPNs
(see "Multiple Entry Point (MEP) VPNs" on page 115).
Automatic RIM
Automatic RIM can be enabled using the GUI when the operating system on the Security Gateway
is SecurePlatform, IPSO or Linux. Although a custom script can be used on these systems, no
custom-written scripts are required.
In this scenario:
• Security Gateways 1 and 2 are both RIM and have a dynamic routing protocol enabled.
• R1 and R4 are enabled routers.
• When a VPN tunnel is created, RIM updates the local routing tables of Security Gateway 1 and
Security Gateway 2 to include the encryption domain of the other Security Gateway.
• Should the VPN tunnel become unavailable, traffic is redirected to the leased line.
The routing tables for the Security Gateways and routers read as follows. Entries in bold represent
routes injected into the Security Gateways local routing tables by RIM:
Security Gateway 2:
Destination Netmask Security Gateway Metric
0.0.0.0 0.0.0.0 172.16.20.2 1
Custom Scripts
Custom scripts can be run on any Security Gateway in the community. These scripts are executed
whenever a tunnel changes its state, i.e. goes "up" or "down." Such an event, for example, can be
the trigger that initiates a dial-up connection.
A script template custom_rim (with a .sh or .bat extension depending on the operating system) is
provided in the $FWDIR/Scripts directory.
Sample customized script:
#!/bin/sh
# This script is invoked each time a tunnel is configured with the RIM option
# and the tunnel changed state.
#
# You may add your custom commands to be invoked here.
case "${RIM_NEW_STATE}" in
up)
# Place your action for tunnels that came up
;;
down)
# Place your action for tunnel that went down
;;
esac
Where:
• RIM_PEER_Security Gateway: Peer Security Gateway
• RIM_NEW_STATE: Change in the state of the Security Gateway, i.e. up or down.
• RIM_HA_STATE: State of a single Security Gateway in a cluster (i.e., standby or active).
• RIM_FIRST_TIME: The script is executed separately for each network within the peer's
encryption domain. Although the script might be executed multiple times on a peer, this
parameter will only be transferred to the script with the value of '1' the first time the script
runs on the peer. The value '1' indicates that this is the first time this script is being executed.
The next time the script is executed, it is transferred with the value of '0' and the parameter is
disregarded. For example, you may send an email alert to the system administrator the
moment a tunnel goes down.
• Security Gateways A and B are both RIM enabled and Security Gateway C has Hide NAT
enabled on the external interface ("hiding" all the IP addresses behind it).
• Host 1, behind Security Gateway C, initiates a VPN tunnel with Host 2, through Security
Gateway A.
• Router 3 holds routes to all the hosts behind Security Gateway C. Router 3 however, does not
have the Hide NAT IP address of Security Gateway C and as a result, cannot properly route
packets back to host 1.
This solution for routing the packets back properly is twofold:
1. Select the flag RIM_inject_peer_interfaces in the Global Properties page. This flag will inject
router 3 with all of the IP addresses of Security Gateway C including the Hide NAT address.
2. Configure the router not to propagate the information injected to other Security Gateways. If
the router is not configured properly, using the previous example, could result in Security
Gateway B routing traffic to Security Gateway C through Security Gateway A.
Configuring RIM
Configuring RIM in a Star Community
1. Open the Star Community > Tunnel Management page.
2. In the Permanent Tunnels section, select Set Permanent Tunnels. The following Permanent
Tunnel (see "Permanent Tunnels" on page 93) modes are then made available:
• On all tunnels in the community
• On all tunnels of specific Security Gateways
• On specific tunnels in the community
When choosing tunnels, keep in mind that RIM can only be enabled on tunnels that have been
configured to be permanent (see "Configuring Tunnel Features" on page 97). On all tunnels in the
community must be selected if MEP is enabled on the community.
1. Select Enable Route Injection Mechanism (RIM).
2. Click Settings...
The Star Community Settings window opens
Decide if:
• RIM should run automatically on the central or satellite Security Gateways (Gaia,
SecurePlatform, or IPSO only).
• A customized script should be run on central or satellite Security Gateways whenever a
tunnel changes its states (goes up or down).
You can also configure the tracking options (on page 98).
3. If a customized script is run, edit custom_rim (.sh or .bat) script in the $FWDIR/Scripts
directory on each of the Security Gateways.
Decide if:
• RIM should run automatically on the Security Gateways (SecurePlatform, IPSO or Linux
only).
• A customized script should be run on the Security Gateway whenever a tunnel changes its
state (goes up or down).
For tracking options, see Tracking Options (on page 104).
3. If a customized script is run, edit custom_rim (.sh or .bat) script in the $FWDIR/Scripts
directory on each of the Security Gateways.
Tracking Options
Several types of alerts can be configured to keep administrators up to date on the status of
Security Gateways. The Tracking settings can be configured on the Community object, in the
Tunnel Management > Enable Route Injection Mechanism > Settings page. The options are Log,
Popup Alert, Mail Alert, SNMP Trap Alert, and User Defined Alert.
Wire Mode
In This Section:
Overview of Wire Mode ...............................................................................................106
Wire Mode Scenarios ..................................................................................................106
Special Considerations for Wire Mode ......................................................................109
Configuring Wire Mode ...............................................................................................110
• Security Gateway M1 and Security Gateway M2 are both wire mode enabled and have trusted
internal interfaces.
• The community where Security Gateway M1 and Security Gateway M2 reside, is wire mode
enabled.
• Host 1, residing behind Security Gateway S1 is communicating through a VPN tunnel with Host
2 residing behind Security Gateway M1.
• MEP ("Multiple Entry Point (MEP) VPNs" on page 115) is configured for Security Gateway M1
and Security Gateway M2 with Security Gateway M1 being the primary Security Gateway and
Security Gateway M2 as the backup.
In this case, if Security Gateway M1 goes down, the connection fails over to Security Gateway M2. A
packet leaving Host 2 will be redirected by the router behind Security Gateway M1 to Security
Gateway M2 since Security Gateway M2 is designated as the backup Security Gateway. Without
wire mode, stateful inspection is enforced at Security Gateway M2 and the connection is dropped.
Packets that come into a Security Gateway whose session was initiated through a different
Security Gateway, are considered "out-of-state" packets. Since Security Gateway M2's internal
interface is "trusted," and wire mode in enabled on the community, no stateful inspection is
performed and Security Gateway M2 will successfully continue the connection without losing any
information.
• Wire mode is enabled on Center Security Gateway C (without an internal trusted interface
specified).
• The community is wire mode enabled.
• Host 1 residing behind Satellite Security Gateway A wishes to open a connection through a VPN
tunnel with Host 2 behind Satellite Security Gateway B.
In a satellite community, Center Security Gateways are used to route traffic between Satellite
Security Gateways within the community.
In this case, traffic from the Satellite Security Gateways is only rerouted by Security Gateway C
and cannot pass through Security Gateway C's firewall. Therefore, stateful inspection does not
need to take place at Security Gateway C. Since wire mode is enabled on the community and on
Security Gateway C, making them trusted, stateful inspection is bypassed. Stateful inspection,
however, does take place on Security Gateways A and B.
The match conditions are represented by a series of compound objects. The match conditions
enforce traffic in the following directions:
• To and from the VPN Community via VPN routing (MyIntranet => MyIntranet)
• From the Community to the local VPN domains (MyIntranet =>internal_clear)
• From the local VPN domains to the VPN community (internal_clear => MyIntranet)
Note - Clear text connections originating from the following objects are not subject to
enforcement:
• Any Traffic
• External_clear
• Internal_clear
There is no limit to the number of VPN directions that can be configured on a single rule. In
general, if you have many directional enforcements, consider replacing them with a standard
bidirectional condition.
The directional VPN rule below must be configured for the enforcement point gateway in the
Access Control Policy Rule Base:
The rule is applied to all VPN traffic that passes through the enforcement point gateway between
the Washington and London communities. If a connection is opened from a source in the
Washington Mesh, and the destination is in the London Star, the connection is allowed. Otherwise,
the connection is denied.
Note - The Directional Enforcement applies only to the first packet of a connection. If the
connection is permitted, the following packets of this connection are also permitted,
including the packets in the opposite direction.
Overview of MEP
Multiple Entry Point (MEP) is a feature that provides a High Availability and Load Sharing solution
for VPN connections. A Security Gateway on which the VPN module is installed provides a single
point of entry to the internal network. It is the Security Gateway that makes the internal network
"available" to remote machines. If a Security Gateway should become unavailable, the internal
network too, is no longer available. A MEP environment has two or more Security Gateways both
protecting and enabling access to the same VPN domain, providing peer Security Gateways with
uninterrupted access.
Implementation
MEP is implemented via a proprietary Probing Protocol (PP) that sends special UDP RDP packets
to port 259 to discover whether an IP is reachable. This protocol is proprietary to Check Point and
does not conform to RDP as specified in RFC 908/1151.
Note - These UDP RDP packets are not encrypted, and only test the availability of a
peer.
The peer continuously probes or polls all MEP Security Gateways in order to discover which of the
Security Gateways are "up", and chooses a Security Gateway according to the configured selection
mechanism. Since RDP packets are constantly being sent, the status of all Security Gateways is
known and updated when changes occur. As a result, all Security Gateways that are "up" are
known.
There are two available methods to implement MEP:
• Explicit MEP - Only Star communities with more than one central Security Gateway can enable
explicit MEP, providing multiple entry points to the network behind the Security Gateways.
When available, Explicit MEP is the recommended method.
• Implicit MEP - Implicit MEP is supported in all scenarios where fully or partially overlapping
encryption domains exist or where Primary-Backup Security Gateways (on page 124) are
configured. When upgrading from a version prior to NGX (R60) where Implicit MEP was already
configured, the settings previously configured will remain.
Explicit MEP
In a site to site Star VPN community, explicit MEP is configured in the VPN community object.
When MEP is enabled, the satellites consider the "unified" VPN domain of all the Security
Gateways as the VPN domain for each Security Gateway. This unified VPN domain is considered
the VPN domain of each Security Gateway:
In the figure, a Star VPN community has two central Security Gateways, M1 and M2 (for which
MEP has been enabled) and three satellite Security Gateways — S1, S2, and S3. When S2 opens a
connection with host-1 (which is behind M1 and M2), the session will be initiated through either M1
or M2. Priority amongst the MEP Security Gateways is determined by the MEP entry point
selection mechanism.
If M2 is the selected entry point and becomes unavailable, the connection to host-1 fails over to
M1. Returning packets will be rerouted using RIM or IP Pool NAT. For more information about
returning packets, see Routing Return Packets (on page 125).
There are four methods used to choose which of the Security Gateways will be used as the entry
point for any given connection:
• Select the closest Security Gateway to source (First to respond)
• Select the closest Security Gateway to destination (By VPN domain)
• Random Selection (for Load distribution)
• Manually set priority list (MEP rules)
If either "By VPN domain" or "Manually set priority list" is selected, then Advanced options provide
additional granularity.
First to Respond
When there is no primary Security Gateway, all Security Gateways share "equal priority". When all
Security Gateways share equal priority:
• Remote peers send RDP packets to all the Security Gateways in the MEP configuration.
• The first Security Gateway to respond to the probing RDP packets gets chosen as the entry
point to network. The idea behind first to respond is proximity. The Security Gateway which is
"closer" to the remote peer responds first.
• A VPN tunnel is opened with the first to respond. All subsequent connections pass through the
chosen Security Gateway.
• If the Security Gateway ceases to respond, a new Security Gateway is chosen.
By VPN Domain
Before you enable MEP, each IP address belongs to a specific VPN domain. With By VPN Domain,
the Security Gateway of that domain becomes the chosen entry point. In the figure, the VPN Star
community has two central MEP Security Gateways (M1 and M2, each of which have their own VPN
domains), and remote satellite S1.
Host-2 (in the VPN domain of satellite S1 initiates a connection with host-1. The connection can be
directed through either M1 or M2. However, host-1 is within M2's original VPN domain. For this
reason, M2 is considered the Security Gateway "closest" to the destination IP Address. M2 is
therefore considered the primary Security Gateway and M1 the backup Security Gateway for
Host-1. If there were additional Security Gateways in the center, these Security Gateways would
also be considered as backup Security Gateways for M2.
If the VPN domains have fully or partially overlapping encryption domains, then more than one
Security Gateway will be chosen as the "closest" entry point to the network. As a result, more than
one Security Gateway will be considered as "primary." When there are more than one primary or
backup Security Gateways available, the Security Gateway is selected using an additional selection
mechanism. This advanced selection mechanism can be either (See Advanced Settings (on page
122)):
• First to Respond
• Random Selection (for load distribution)
For return packets you can use RIM on the center Security Gateways. If RIM is also enabled, set a
metric with a lower priority value for the leased line than the VPN tunnel. The satellite S1 might
simultaneously have more than one VPN tunnel open with the MEP Security Gateways, for
example M2 as the chosen entry point for host-1 and M1 as the chosen entry point for host-3.
While both M1 and M2 will publish routes to host-1 and host-3, the lower priority metric will
ensure the leased line is used only when one of the Security Gateways goes down.
Random Selection
Using this method, a different Security Gateway is randomly selected as an entry point for
incoming traffic. Evenly distributing the incoming traffic through all the available Security
Gateways can help prevent one Security Gateway from becoming overwhelmed with too much
incoming traffic.
The Security Gateways are probed with RDP packets, as in all other MEP configurations, to create
a list of responding Security Gateways. A Security Gateway is randomly chosen from the list of
responding Security Gateways. If a Security Gateway stops responding, another Security Gateway
is (randomly) chosen.
A new Security Gateway is randomly selected for every source/destination IP pair. While the
source and destination IP's remain the same, the connection continues through the chosen
Security Gateway.
In such a configuration, RIM is not supported. IP Pool NAT must be enabled to ensure return
packets are correctly routed through the chosen Security Gateway.
In the figure, three MEP members (M1, M2, M3) provide entry points to the network for three
satellite Security Gateways (S1, S2, S3). Satellite S1 can be configured to try the Security Gateways
in the following order: M1, M2, M3, giving the highest priority to M1, and the lowest priority to M3.
Satellite S2 can be configured to try the Security Gateways in the following order: M2, M3 (but not
to try M1).
Each of these priorities constitutes a MEP rule in the MEP manual priority list window:
Item Description
1 Default MEP Rule
The MEP manual priority list window is divided into the default rule, and rules which provide
exceptions to the default rule. The default MEP rule takes effect when:
• No MEP rules are defined
• When the source of the connection cannot be found in the Exception priority rules
The Exception priority rules section contains three priority levels: primary, secondary, and
tertiary. While there are only three priority levels,
• The same priority can be assigned to several central Security Gateways
• The same rule can be assigned to several satellite Security Gateways
• A priority level can be left blank
In the second MEP rule below:
Central Security Gateways M3 and M1 have equal priority. The same rule is being applied to
satellites S2 and S3.
When more than one Security Gateway is assigned the same priority level, which Security Gateway
will be chosen is resolved according to the Advanced settings. See Advanced Settings (on page
122).
Advanced Settings
In some instances, more than one Security Gateway is available in the center with no obvious
priority between them. For example — as shown in the second example of the second MEP rule,
above — more than one Security Gateway is assigned "second" priority. In this scenario, Advanced
options are used to decide which Security Gateway is chosen: First to Respond, or Random
Selection. (Choose Random selection to enable load balancing between the Security Gateways.)
When "manually set priority list" is the MEP selection mechanism, RIM is supported. RIM can be
configured with "manually set priority list" because the "random selection" mechanism available
on the Advanced button is different from the random selection mechanism used for MEP.
For the "random selection" mechanism employed for MEP, a different Security Gateway is
selected for each IP source/destination pair. For the random selection mechanism available from
the Advanced button, a single MEP entry point is randomly selected and then used for all
connections, and does not change according to source/destination pair. Load distribution is
therefore achieved since every satellite Security Gateway is randomly assigned a Security Gateway
as its entry point. This makes it possible to enable RIM at the same time.
Tracking
If the tracking option is enabled for MEP, the following information is logged by each satellite
Security Gateway:
• The resolved peer Security Gateway (a Security Gateway in the MEP)
• The priority of the resolved Security Gateway (primary, secondary, tertiary)
• Whether the resolved Security Gateway is responding
For example, in the scenario shown in the Manually Set Priority List (on page 120) section,
satellite S1 opens a connection to the VPN domain that includes Security Gateways M1, M2, and
M3. M1 is the resolved peer. If tracking is enabled, the log reads:
Resolved peer for tunnel from S1 to the MEP that contains M1, M2, and M3,
is: M1 (Primary Security Gateway, responding).
Implicit MEP
There are three methods to implement implicit MEP:
• First to Respond, in which the first Security Gateway to reply to the peer Security Gateway is
chosen. An organization would choose this option if, for example, the organization has two
Security Gateways in a MEP configuration - one in London, the other in New York. It makes
sense for VPN-1 peers located in England to try the London Security Gateway first and the NY
Security Gateway second. Being geographically closer to VPN peers in England, the London
Security Gateway is the first to respond, and becomes the entry point to the internal network.
See: First to Respond (on page 123).
• Primary-Backup, in which one or multiple backup Security Gateways provide "high availability"
for a primary Security Gateway. The remote peer is configured to work with the primary
Security Gateway, but switches to the backup Security Gateway if the primary goes down. An
organization might decide to use this configuration if it has two machines in a MEP
environment, one of which is stronger than the other. It makes sense to configure the stronger
machine as the primary. Or perhaps both machines are the same in terms of strength of
performance, but one has a cheaper or faster connection to the Internet. In this case, the
machine with the better Internet connection should be configured as the primary. See:
Primary-Backup Security Gateways (on page 124).
• Load Distribution, in which the remote VPN peer randomly selects a Security Gateway with
which to open a connection. For each IP source/destination address pair, a new Security
Gateway is randomly selected. An organization might have a number of machines with equal
performance abilities. In this case, it makes sense to enable load distribution. The machines
are used in a random and equal way. See: Random Selection (on page 120).
Implicit MEP is supported if the Security Gateways with overlapping encryption domains are in the
same community. If they are located in different communities, only one of the Security Gateways
will be used for this encryption domain.
Note - When upgrading from a version prior to NGX R60 where Implicit MEP was
already configured, the settings previously configured will remain.
First to Respond
When there is no primary Security Gateway, all Security Gateways share "equal priority." When all
Security Gateway's share "equal priority":
• Remote VPN peers send RDP packets to all the Security Gateways in the MEP configuration.
• The first Security Gateway to respond to the probing RDP packets gets chosen as the entry
point to network. The idea behind first to respond is "proximity". The Security Gateway which is
"closer" to the remote VPN peer responds first.
• A VPN tunnel is opened with the first to respond. All subsequent connections pass through the
chosen Security Gateway.
• If the Security Gateway ceases to respond, a new Security Gateway is chosen.
In a star community, RDP packets are sent to the Security Gateways and the first to respond is
used for routing only when:
There is more than one center Security Gateway, and
One of the following VPN routing options was selected:
• To center and to other satellites through center
• To center, or through the center to other satellites, to internet and other VPN targets
This setting is found on the Community Properties > VPN Advanced > VPN Routing page.
In this scenario:
Note - When using the Primary-Backup Security Gateways method, the encryption
domains should not overlap
Load Distribution
To prevent any one Security Gateway from being flooded with connections, the connections can be
evenly shared amongst all the Security Gateways to distribute the load. When all Security
Gateways share equal priority (no primary) and are MEP to the same VPN domain, it is possible to
enable load distribution between the Security Gateways. The Security Gateways are probed with
RDP packets, as in all other MEP configurations, to create a list of responding Security Gateways.
A Security Gateway is randomly chosen from the list of responding Security Gateways. If a Security
Gateways stops responding, a new Security Gateway is (randomly) chosen.
A new Security Gateway is randomly selected for every source/destination IP pair. While the
source and destination IP's remain the same, the connection continues through the chosen
Security Gateway.
RIM
Route Injection Mechanism (RIM) enables a Security Gateway to use a dynamic routing protocol to
propagate the encryption domain of a VPN peer Security Gateway to the internal network. When a
VPN tunnel is created, RIM updates the local routing table of the Security Gateway to include the
encryption domain of the VPN peer.
When a tunnel to a MEP Security Gateway goes down, the Security Gateway removes the
appropriate "return route" from its own local routing table. This change is then distributed
backwards to the routers behind the Security Gateway.
RIM is based both on the ability of the Security Gateway to update its local routing table, and the
presence of the a dynamic routing protocol to distribute the change to the network behind the
Security Gateway. There is little sense in enabling RIM on the Security Gateway if a dynamic
routing protocol is not available to distribute changes.
When MEP is enabled, RIM can be enabled only if permanent tunnels are enabled for the whole
community. In a MEP configuration RIM is available when using the First to Respond, Manual set
Site to Site VPN Administration Guide R80.10 | 125
Multiple Entry Point (MEP) VPNs
priority list, and VPN Domain mechanisms. In the first two options, satellite Security Gateways
"see" the center Security Gateways as unified as if one tunnel is connecting them. As a result, only
the chosen MEP Security Gateway will inject the routes. In VPN Domain MEP, it could be that all
MEP Security Gateways will inject the routes, which requires configuring the routers behind the
MEP Security Gateways to return packets to the correct Security Gateway.
RIM is not available when Random Selection is the selected entry point mechanism.
For more information on RIM, see Route Injection Mechanism (on page 99).
Special Considerations
1. If one of the central Security Gateways is an externally managed Security Gateway:
• The VPN domain of the central Security Gateways will not be automatically inherited by an
externally managed Security Gateway
• The RIM configuration will not be automatically downloaded
2. UTM-1 Edge Security Gateways cannot be configured as a MEP Security Gateway but can
connect to MEP Security Gateways.
3. DAIP Security Gateways require DNS resolving in order to be configured as MEP Security
Gateways.
Configuring MEP
To configure MEP, decide on:
1. The MEP method
• Explicit MEP - See Explicit MEP (on page 116).
• Implicit MEP - See Implicit MEP (on page 122).
2. If required, method for returning reply packets:
• IP pool NAT
• RIM - To configure RIM, see Configuring RIM (on page 103).
To configure MEP:
1. Open the Star Community object and go to the MEP page.
2. Select Enable center gateways as MEP.
3. Select an entry point mechanism:
• First to respond
• By VPN domain
• Random selection
• Manual priority list
If you select By VPN domain or Manually set priority list, in the Advanced, section choose
First to respond or Random selection to resolve how more than one Security Gateway with
equal priority should be selected.
If you select Manually set priority list, click Set to create a series of MEP rules.
4. Select a Tracking option, if required.
5. For each backup gateway, make a VPN domain that does not include IP addresses that are in
the Primary VPN domain or the other backup domains.
If the backup gateway already has a VPN domain, you must make sure that its IP addresses do
not overlap with the other VPN domains.
a) Create a group of IP addresses not in the other domains, or a group that consists of only
the backup gateway.
b) In the backup network object, go to the Network Management > VPN Domain section,
select Manually defined.
c) Select the group.
6. Click OK.
7. Install the policy.
4. On the Security Gateway object where IP pool NAT translation is performed, in the NAT > IP
Pool NAT page, select either
• Allocate IP Addresses from, and select the address range you created, OR
• Define IP Pool addresses on Security Gateway interfaces. If you choose this option, you
need to define the IP Pool on each required interface, in the Interface Properties window,
IP Pool NAT tab.
5. In the IP Pool NAT page, select either (or all):
• Use IP Pool NAT for VPN clients connections
• Use IP Pool NAT for Security Gateway to Security Gateway connections
• Prefer IP Pool NAT over Hide NAT
6. Click Advanced...
• Decide after how many minutes unused addressees are returned to the IP pool.
• Click OK twice.
7. Edit the routing table for each internal router, so that packets with an IP address assigned
from the NAT pool are routed to the appropriate Security Gateway.
IPsec NAT-Traversal
NAT-T (NAT traversal or UDP encapsulation) makes sure that IPsec VPN connections stay open
when traffic goes through gateways or devices that use NAT.
When an IP packet passes through a network address translator device, it is changed in a way that
is not compatible with IPsec. To protect the original IPsec encoded packet, NAT traversal
encapsulates it with an additional layer of UDP and IP headers.
For IPsec to work with NAT traversal, these protocols must be allowed through the NAT
interface(s):
• IKE - UDP port 500
• IPsec NAT-T - UDP port 4500
• Encapsulating Security Payload (ESP) - IP protocol number 50
• Authentication Header (AH) - IP protocol number 51
Configuring NAT-Traversal
To configure NAT-T for site-to-site VPN:
1. Open the Gateway Properties of a gateway that has IPsec VPN enabled.
2. Select IPsec VPN > VPN Advanced.
3. Make sure that Support NAT traversal (applies to Remote Access and Site to Site
connections) is selected.
NAT-Traversal is enabled by default when a NAT device is detected.
APPENDIX A
VPN Commands
These commands relate to VPN and are also documented in the R80.10 Command Line Interface
Reference Guide http://downloads.checkpoint.com/dc/download.htm?ID=54840.
VPN Command Line interface
Command Description
VPN This command and subcommands are used for working with various
aspects of VPN. VPN commands executed on the command line
generate status information regarding VPN processes, or are used to
stop and start specific VPN services.
vpn crl_zap This command is used to erase all Certificate Revocation Lists (CRLs)
from the cache.
vpn crlview This command retrieves the Certificate Revocation List (CRL) from
various distribution points and displays it for the user.
vpn debug This command instructs the VPN daemon to write debug messages to
the log file: $FWDIR/log/vpnd.elg.
vpn drv This command installs the VPN kernel (vpnk) and
connects it to the Firewall kernel (fwk), attaching the
VPN driver to the Firewall driver.
vpn export_p12 This command exports information contained in the network objects
database and writes it in the PKCS#12 format to a file with the p12
extension.
vpn macutil This command is related to Remote Access VPN, specifically Office
mode, generating a MAC address per remote user. This command is
relevant only when allocating IP addresses via DHCP.
Command Description
vpn mep_refresh This command causes all MEP tunnels to fail-back to the best
available gateway, providing that backup stickiness has been
configured.
vpn nssm_toplogy This command generates and uploads a topology (in NSSM format) to
a IPSO NSSM server for use by IPSO clients.
vpn overlap_encdom This command displays all overlapping VPN domains. Some IP
addresses might belong to two or more VPN domains. The command
alerts for overlapping encryption domains if one or both of the
following conditions exist:
• The same VPN domain is defined for both Security Gateways
• If the gateway has multiple interfaces, and one or more of the
interfaces has the same IP address and netmask.
vpn sw_topology This command downloads the topology for a SofaWare Security
Gateway.
vpn ver This command displays the VPN major version number and build
number.
vpn tu This command launches the TunnelUtil tool which is used to control
VPN tunnels.