CheckPoint U-10 Getting Started
CheckPoint U-10 Getting Started
To prevent damage to any system board, it is important to handle it with care. The
following measures are generally sufficient to protect your equipment from static
electricity discharge:
• When handling the board, to use a grounded wrist strap designed for static
discharge elimination.
• Touch a grounded metal object before removing the board from the antistatic bag.
• Handle the board by its edges only. Do not touch its components, peripheral chips,
memory modules or gold contacts.
• When handling processor chips or memory modules, avoid touching their pins or
gold edge fingers.
• Restore the communications appliance system board and peripherals back into the
antistatic bag when they are not in use or not installed in the chassis. Some
circuitry on the system board can continue operating even though the power is
switched off.
• Under no circumstances should the lithium battery cell used to power the real-time
clock be allowed to short. The battery cell may heat up under these conditions
and present a burn hazard.
3
• Disconnect the system board power supply from its power source before you
connect or disconnect cables or install or remove any system board components.
Failure to do this can result in personnel injury or equipment damage.
• Avoid short-circuiting the lithium battery; this can cause it to superheat and cause
burns if touched.
• Do not operate the processor without a thermal solution. Damage to the processor
can occur in seconds.
For California:
Perchlorate Material - special handling may apply. See
http://www.dtsc.ca.gov/hazardouswaste/perchlorate
The foregoing notice is provided in accordance with California Code of Regulations Title 22, Division
4.5, Chapter 33. Best Management Practices for Perchlorate Materials. This product, part, or both
may include a lithium manganese dioxide battery which contains a perchlorate substance.
Proposition 65 Chemical
Chemicals identified by the State of California, pursuant to the requirements of the California Safe
Drinking Water and Toxic Enforcement Act of 1986, California Health & Safety Code s. 25249.5, et
seq. ("Proposition 65"), that is “known to the State to cause cancer or reproductive toxic- ity” (see
http://www.calepa.ca.gov)
WARNING:
Handling the cord on this product will expose you to lead, a chemical known to the State of California
to cause cancer, and birth defects or other reproductive harm. Wash hands after handling.
Federal Communications Commission (FCC) Statement:
Note: This equipment has been tested and found to comply with the limits for
a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are
designed to provide reasonable protection against harmful interference when
the equipment is operated in a commercial environment. This equipment
generates, uses, and can radiate radio frequency energy and, if not installed
and used in accordance with the instruction manual, may cause harmful
interference to radio communications. Operation of this equipment in a residential
area is likely to cause harmful interference in which case the user will be required
to correct the interference at his own expense.
Information to user:
The users manual or instruction manual for an intentional or unintentional radiator shall caution the
user that changes or modifications not expressly approved by the party responsible for compliance
could void the user's authority to operate the equipment. In cases where the manual is provided only
in a form other than paper, such as on a computer disk or over the Internet, the information required
by this section may be included in the manual in that alternative form, provided the user can
reasonably be expected to have the capability to access information in that form.
Canadian Department Compliance Statement:
This Class A digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe
A est conforme à la norme NMB-003 du Canada.
Japan Class A Compliance Statement:
European Union (EU) Electromagnetic Compatibility Directive
Is herewith confirmed to comply with the requirements set out in the Council Directive on the
Approximation of the Laws of the Member States relating to Electromagnetic Compatibility Directive
(2004/108/EC). For the evaluation regarding the Electromagnetic Compatibility (2004/108/EC)
The above product is conformity with Low Voltage Directive 2006/95/EC into comply with the
requirements in the Council Directive 2006/95/EC relating to electrical equipment designed for use
within certain voltage limits and the Amendment Directive 93/68/EEC
This symbol on the product or on its packaging indicates that this product must not be
disposed of with your other household waste. Instead, it is your responsibility to dispose
of your waste equipment by handing it over to a designated collection point for the
recycling of waste electrical and electronic equipment. The separate collection and
recycling of your waste equipment at the time of disposal will help to conserve natural
resources and ensure that it is recycled in a manner that protects human health and the
environment. For more information about where you can drop off your waste equipment
for recycling, please contact your local city office or your household waste disposal
service.
4
© 2003-2009 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and
distributed under licensing restricting their use, copying, distribution, and decompilation. No part of
this product or related documentation may be reproduced in any form or by any means without
prior written authorization of Check Point. While every precaution has been taken in the
preparation of
this book, Check Point assumes no responsibility for errors or omissions. This publication
and features described herein are subject to change without notice.
TRADEMARKS:
Chapter 1
Introduction
Welcome................................................................................... 9
UTM-1 Overview ...................................................................... 10
Shipping Carton Contents ......................................................... 12
Terminology ............................................................................ 13
Chapter 2
Installation and Configuration
Configuring UTM-1 .................................................................. 16
The Configuration Workflow ............................................. 16
Step 1: Installing UTM-1 in the Rack ............................... 16
Step 2: Identifying the Default Management Interface ........ 16
Step 3: Connecting the Cables ......................................... 17
Step 4: Advanced Initial Configuration .............................. 18
Step 5: Installing the SmartConsole GUI Clients ................ 26
Step 6: First Time Login to the Security Management Server 26
Step 7: Configure and Install Security Policy ..................... 27
Restoring Factory Defaults ........................................................ 33
Restoring Using the WebUI .............................................. 33
Restoring Using the Console Boot Menu ............................ 34
Restoring Using the LCD Panel ........................................ 36
7
Advanced Configuration ............................................................38
Chapter 3
UTM-1 Hardware
UTM-1 130 Ports.....................................................................40
LEDs on the UTM-1 130 ..........................................................41
LEDs on all other UTM-1 Models ...............................................42
Managing UTM-1 Using the LCD Panel .....................................43
Chapter 4
Registration and Support
Registration .............................................................................47
Support...................................................................................47
Where To From Here? ...............................................................48
8
Chapter 1
Introduction
In This Chapter
Welcome page 9
UTM-1 Overview page 10
Shipping Carton Contents page 12
Terminology page 13
Welcome
Thank you for choosing Check Point’s Internet Security
Product Suite. We hope that you will be satisfied with this
solution and our support services. Check Point products
provide your business with the most up to date and secure
solutions available today.
Check Point also delivers worldwide technical services
including educational, professional and support services
through a network of Authorized Training Centers, Certified
Support Partners and Check Point technical support personnel
to ensure that you get the most out of your security
investment.
For additional information on the Check Point Internet
Security Product Suite and other security solutions, refer to:
http://www.checkpoint.com or call Check Point at 1(800)
429-4391. For additional technical information, refer to:
http://support.checkpoint.com.
9
UTM-1 Overview
UTM-1 Overview
Check Point UTM-1 delivers integrated unified threat management to
protect your organization from today's emerging threats. Based on
proven Check Point security technologies such as Stateful Inspection,
Application Intelligence, and SMART (Security Management
Architecture), UTM-1 provides simplified deployment and
management while delivering uncompromising levels of security.
UTM-1 supports the Check Point Software Blade architecture,
providing independent, modular and centrally managed security
building blocks. Software Blades can be quickly enabled and
configured into a solution based on specific security needs.
The following Software Blades are included in UTM-1:
10
UTM-1 Overview
Chapter 1 Introduction 11
Shipping Carton Contents
Item Description
Appliance A single UTM-1
Rack Mounting Accessories Hardware mounting kit
(Not applicable to UTM-1 130)
Cables • 1 Power cable
• 1 Standard network cable
• 1 Serial console cable
Power Supply Power Supply Unit
(Applicable only to UTM-1 130)
CD Includes the following:
• SmartConsole
management software
• UTM-1 Getting Started Guide
• UTM-1 Administration Guide
• Check Point R70 documentation
Regulations and Documentation • User license agreement.
• UTM-1 Release Notes.
12
Terminology
Terminolo
gy
The following UTM-1 terms are used throughout this guide:
• Gateway: The Security Gateway engine that enforces the
organization’s security policy and acts as a security enforcement
point.
• Security Policy: The policy created by the system administrator
that regulates the flow of incoming and outgoing
communication.
• Security Management server: The server used by the system
administrator to manage the security policy. The organization’s
databases and security policies are stored on the Security
Management server and downloaded to the gateway.
• SmartConsole: GUI applications that are used to manage
various aspects of security policy enforcement. For example,
SmartView Tracker is a SmartConsole application that
manages logs.
• SmartDashboard: A SmartConsole GUI application that is
used by the system administrator to create and manage the
security policy.
• Locally managed deployment: When all Check Point components
responsible for both the management and enforcement of the
security policy (the Security Management server and the
gateway) are installed on the same machine.
• Centrally managed deployment: When the gateway and the
Security Management server are installed on separate machines.
• UTM-1 cluster: Refers to two UTM-1 devices with synchronized
Security Management servers and gateways.
Chapter 1 Introduction 13
Terminology
14
Chapter 2
Installation and
Configuration
This chapter explains how to configure UTM-1 using the First
Time Wizard and how to restore factory defaults.
In This Chapter
Configuring UTM-1
The Configuration Workflow
To configure UTM-1, perform the following simple steps:
Step 1: Install UTM-1 onto the rack.
Step 2: Identify the default management interface.
Step 3: Connect the cables and power on.
Step 4: Perform advanced initial configuration.
Step 5: Install the SmartConsole GUI clients.
Step 6: Login to SmartDashboard and compare the fingerprint.
Step 7: Configure and install the security policy.
Install the system in the rack with the network ports facing the
front of the rack.
16
Configuring UTM-1
18
Configuring UTM-1
20
Configuring UTM-1
Click Next.
11. Follow the procedure below for your deployment:
• Locally Managed Deployment: Skip to step 12
• Centrally Managed Deployment:
a. Configure the Web/SSH and GUI Clients
Configuration
window as described in step 13. Click Next.
b. Set the type of Gateway on the Gateway Type page.
22
Configuring UTM-1
24
Configuring UTM-1
26
Configuring UTM-1
Define a Host
Define the hosts to be used in the Firewall Rule Base.
To define a host:
1. Click Manage > Network Objects > New > Node > Host.
The
Host Node window appears.
2. Enter a Name and IP Address (for example, 10.10.10.51).
28
Configuring UTM-1
Define a Network
Define the networks to be used in the Firewall Rule Base.
To define a network:
1. Click Manage > Network Objects > New > Network.
2. Enter the Name and Network Address (for example,
10.10.10.0) and Net Mask.
3. On the NAT tab, select Add Automatic Address
Translation rules.
4. From the Translation Method drop down menu, select
Hide, and the option Hide behind Gateway, and click OK.
1. From the menu, select Rules > Add Rule and choose one
of
Bottom, Top, Below, Above.
2. In the Source column, right click and select Add..., choose
an object and click OK.
3. In the Service column, right click, select Add..., choose a
service and click OK.
4. In the Action column, right click and select Accept. The
last rule in the rule base should be drop.
5. In the Track column, right click, select Add... and choose
Log.
6. To view all activity that is being logged, click Window >
SmartView Tracker.
30
Configuring UTM-1
32
Restoring Factory Defaults
34
Restoring Factory Defaults
36
Restoring Factory Defaults
38
Advanced Configuration
Advanced Configuration
Advanced configuration can be done using the sysconfig
menu which can be accessed using the command line interface
only. For example, configuring the appliance to be a DHCP
server.
In This Chapter
39
UTM-1 130 Ports
1 2 3 4 5
1Gbit
100Mbit 100Mbit Console Port
10Mbit 10Mbit
• 1 Gigabit Ethernet ports
The INT, SYNC/LAN1,LAN2 and DMZ ports support:
• 1Gbit, 100Mbit and 10Mbit speeds.
• Auto MDI-X, to automatically detect the required
cable connection type (straight-through or crossover)
and configure the connection appropriately.
• 100 Megabit Ethernet port
• The EXT port supports 100Mbit and 10Mbit speed,
but does not support the Auto MDI-X standard.
• When connecting this port, use the appropriate cable
type: straight-through or crossover.
• Console port – for managing the appliance using RS-232
serial communication. Use the supplied serial cable.
The UTM-1 appliance has a single power port at the rear:
Power Port
40
LEDs on the UTM-1 130
1 2 3 4 5
Power On/Off
Indicator
Activity Speed
Indicator Indicator
Port
Indicators
The purpose and meaning of the various LEDs are as follows:
• Power On/Off Indicator: This green light is lit when the
machine is ON. When the machine is OFF, the light is off.
• HDD Operation Indicator: An amber light that blinks when
the hard drive is accessed.
• Port Indicators: There are two lights at the bottom of each
LAN port. When the port is inactive, both are off.
• Activity Indicator: This light is solid green when
connected, and blinking green when encountering
traffic.
• Speed Indicator: When this light is yellow or orange,
the port speed is 1000 Mbps. When it is green, the
port speed is 100 Mbps.
RESE T
1 2 3 4 5 6 7 8 9 10
LAN3
Power On/Off
Indicator RESET
Activity Speed
Indicator 6 Indicator
HDD Operation
Indicator Reset Port
Function (hole) Indicators
42
Managing UTM-1 Using the LCD Panel
Menu options
To Press
Enter the main menu
To Press
Move to the next digit
Move back to
the previous digit
44
Managing UTM-1 Using the LCD Panel
To Press
Approve the change when cursor is located on
the last digit
Cancel the IP change when cursor is located on
the first digit
Change current digit or
46
Chapter 4
Registration and Support
In This Chapter
Registration page 47
Support page 47
Where To From Here? page 48
Registration
UTM-1 requires a specific license to operate. Obtain a license
and register at:
https://usercenter.checkpoint.com/usercenter/reg/utm
The serial number required to obtain a license is found on the
Information > Appliance Status page of the WebUI.
Support
For additional technical information about Check Point
products, consult the Check Point Support Center at:
http://support.checkpoint.com
47
Where To From Here?
48