Checkpoint R65 Edge Management Admin Guide
Checkpoint R65 Edge Management Admin Guide
TM
Contents
Preface
Who Should Use This Guide................................................................................ 8 Summary of Contents ......................................................................................... 9 Related Documentation .................................................................................... 10 More Information ............................................................................................. 13 Feedback ........................................................................................................ 14
Chapter 1
Chapter 2
Index........................................................................................................... 67
Table of Contents
Preface
Preface
P
page 8 page 9 page 10 page 13 page 14
In This Chapter
Who Should Use This Guide Summary of Contents Related Documentation More Information Feedback
Summary of Contents
Summary of Contents
This document describes how your VPN-1 UTM Edge appliance is managed using various Check Point management solutions, such as SmartCenter, Provider-1 and SmartLSM. In this document you will also learn about Check Point features that the VPN-1 UTM Edge support, and how to use them for your VPN solutions. Chapter Chapter 1, Introduction to VPN-1 UTM Edge Appliances Description describes the appliances offered by Check Point that provide both Security and VPN solutions, SMART management and can be used in conjunction with VPN-1 Power and VPN-1 UTM. In addition, this chapter explains how these appliances can be centrally managed and incorporated into existing infrastructures. describes installation and configuration processes.
Preface
Related Documentation
Related Documentation
This release includes the following documentation
TABLE P-1 VPN-1 Power documentation suite documentation
Description Contains an overview of NGX R65 and step by step product installation and upgrade procedures. This document also provides information about Whats New, Licenses, Minimum hardware and software requirements, etc. Explains all available upgrade paths for Check Point products from VPN-1/FireWall-1 NG forward. This guide is specifically geared towards upgrading to NGX R65. Explains SmartCenter Management solutions. This guide provides solutions for control over configuring, managing, and monitoring security deployments at the perimeter, inside the network, at all user endpoints. Describes how to control and secure network access; establish network connectivity; use SmartDefense to protect against network and application level attacks; use Web Intelligence to protect web servers and applications; the integrated web security capabilities; use Content Vectoring Protocol (CVP) applications for anti-virus protection, and URL Filtering (UFP) applications for limiting access to web sites; secure VoIP traffic. This guide describes the basic components of a VPN and provides the background for the technology that comprises the VPN infrastructure.
Upgrade Guide
10
Related Documentation TABLE P-1 VPN-1 Power documentation suite documentation (continued)
Description Explains how to monitor and audit traffic, and generate detailed or summarized reports in the format of your choice (list, vertical bar, pie chart etc.) for all events logged by Check Point VPN-1 Power, SecureClient and SmartDefense. Explains how to install and configure SecurePlatform. This guide will also teach you how to manage your SecurePlatform and explains Dynamic Routing (Unicast and Multicast) protocols. Explains the Provider-1/SiteManager-1 security management solution. This guide provides details about a three-tier, multi-policy management architecture and a host of Network Operating Center oriented features that automate time-consuming repetitive tasks common in Network Operating Center environments.
TABLE P-2
Title Integrity Advanced Server Installation Guide Integrity Advanced Server Administrator Console Reference
Description Explains how to install, configure, and maintain the Integrity Advanced Server. Provides screen-by-screen descriptions of user interface elements, with cross-references to relevant chapters of the Administrator Guide. This document contains an overview of Administrator Console navigation, including use of the help system. Explains how to managing administrators and endpoint security with Integrity Advanced Server. Provides information about how to integrating your Virtual Private Network gateway device with Integrity Advanced Server. This guide also contains information regarding deploying the unified SecureClient/Integrity client package.
Integrity Advanced Server Administrator Guide Integrity Advanced Server Gateway Integration Guide
Preface
11
Title Integrity Advanced Server System Requirements Integrity Agent for Linux Installation and Configuration Guide Integrity XML Policy Reference Guide Integrity Client Management Guide
Description Provides information about client and server requirements. Explains how to install and configure Integrity Agent for Linux. Provides the contents of Integrity client XML policy files. Explains how to use of command line parameters to control Integrity client installer behavior and post-installation behavior.
12
More Information
More Information
For additional technical information about Check Point products, consult Check Points SecureKnowledge at https://secureknowledge.checkpoint.com/.
See the latest version of this document in the User Center at http://www.checkpoint.com/support/technical/documents
Preface
13
Feedback
Feedback
Check Point is engaged in a continuous effort to improve its documentation. Please help us by sending your comments to: [email protected]
14
15
Introduction
Introduction
Thank you for using Check Point VPN-1 UTM Edge appliances, which provide secure connectivity and VPN solutions at affordable prices. Check Points VPN-1 UTM Edge appliances, which include the X-series and S-series appliances, are easy to install and user-friendly. Moreover, along with the VPN-1 appliances (such as, Nokia and NEC devices), they are seamlessly and securely integrated with different Check Point management solutions, such as, SmartCenter, Provider-1 and SmartLSM. This document describes how your VPN-1 UTM Edge appliances are managed using various Check Point management solutions, such as SmartCenter, Provider-1 and SmartLSM. In this document you will also learn about Check Point features that the VPN-1 UTM Edge and other appliances support, and how to use these appliances for your VPN solutions.
16
What these businesses require is a solution that offers connectivity and security at an affordable rate that is easy to integrate into existing infrastructure and is easy to use.
Chapter 1
17
18
Figure 1-1
SmartCenter Deployment
SmartLSM, is an extension of SmartCenter providing administrators with an effective means of provisioning and managing hundreds and thousands of VPN-1 UTM Edge ROBO (Remote Office/Branch Office) gateways. VPN-1 UTM Edge Profiles and Profile policies are defined in SmartDashboard. VPN-1 UTM Edge ROBO gateways are provisioned and managed via the SmartLSM console application. For more information see the SmartLSM Administration Guide.
Chapter 1
19
Figure 1-2
SmartLSM Deployment
Provider-1, is used by large enterprises and by Managed Service Providers to centrally manage multiple, fully customized, customer domains. VPN-1 UTM Edge appliances are integrated transparently with this management solution. The management capabilities of a Provider-1 CMA (Customer Management Add-On) are equivalent to those of the SmartCenter gateway, including the SmartLSM extension. Global VPN Communities are currently not supported for VPN-1 UTM Edge appliances.
20
Figure 1-3
Provider-1 Deployment
Chapter 1
21
The following VPN-1 appliances are also supported: Nokia IP30, IP40, IP45, IP60, IP60W NEC SecureBlade, SecureBlade 300
Whatever the series, the VPN-1 UTM Edge appliances support any of the Check Point management solutions (SmartCenter, SmartLSM...etc). Apart from their own seamless integration and ease of use, they also benefit from most of the advantages of any regular VPN-1 gateway.
22
Chapter 1
23
24
Viewing the Status of VPN-1 UTM Appliances and VPN Creation page 27
Site-to-Site
Unless otherwise stated, VPN-1 UTM Edge Device gateways are added to communities and participate in the VPN tunnel in the same manner as all VPN-1 gateway objects; they are added, like regular participating gateways into the VPN community (Star or Meshed). Consult the Virtual Private Networks Administration Guide for more information on building a VPN between gateways. Note - On SmartCenter Express, any VPN-1 UTM Edge appliance that is connecting using Site-to-Site VPN is considered to be an additional managed site; therefore, you are required to obtain an additional license.
Chapter 1
25
26
Chapter 1
27
28
29
30
Chapter 2
31
3. On the VPN-1 UTM Edge portal, define your SmartCenter Server as the VPN-1 UTM Edge appliances service center. This means that the SmartCenter Server is now responsible for managing the appliance including VPN relations, Access Control, Licensing and updates. The communication between the SmartCenter Server and the VPN-1 UTM Edge appliance is securely connected.
32
Note - In SmartLSM, the profile associated with the VPN-1 UTM Edge Gateway can only participate in a Star community for Site-to-Site configuration. Create one or more dynamic objects to be enforced on the VPN-1 UTM Edge ROBO Gateway. Create rules for your objects and install the Security Policy. This step should be repeated whenever a modification to the VPN-1 UTM Edge ROBO objects are made. This step needs to take place after you have created the VPN-1 UTM Edge ROBO Gateway in SmartLSM. Close SmartDashboard.
4. In SmartLSM, create a VPN-1 UTM Edge ROBO Gateway, add the dynamic object to the VPN-1 UTM Edge ROBO Gateway and update the CO (Corporate Office) Gateway, for more information see the SmartLSM Administration Guide. 5. On the VPN-1 UTM Edge portal, define your SmartCenter Server as the VPN-1 UTM Edge appliances service center. This means that the SmartCenter Server is now responsible for managing the appliance including VPN relations, Access Control, Licensing and updates. The communication between the SmartCenter Server and the VPN-1 UTM Edge appliance is securely connected.
Chapter 2
33
Configuration Operations
Configuration Operations
In This Section
Installation & Configuration Using SmartCenter Working with VPN-1 UTM Edge Objects for SmartCenter Working with VPN-1 UTM Edge objects for SmartLSM SmartDashboard Content Inspection Configuration Creating a Security Policy for VPN-1 UTM Edge Appliance Security Policy Operations Managing VPN-1 UTM Edge Devices with SmartCenter Server Remote Login to the SmartCenter Server Configuring VPN in SmartCenter Configuring VPN-1 in SmartLSM Viewing Logs in the SmartView Tracker Downloading the Latest Firmware from SmartUpdate page 35 page 35 page 42 page 47 page 47 page 48 page 49 page 51 page 52 page 58 page 59 page 60
34
Select QoS Managed Gateway to configure QoS for a specific host or gateway in the Topology tab. When this option is selected you can define QoS (Quality of Service) and specify guaranteed bandwidth level and limits for gateways/hosts.
Enable the Web UI administration GUI within SmartDashboard by selecting Configure Edge Using Web Interface. Figure 2-1 New VPN-1 UTM Edge Gateway configured for Site-to-Site VPN-1
3. In the VPN-1 UTM Edge Gateway - Topology page (Figure 2-2), the topology is set automatically because it represents the hard coded device. The set topology includes the following three interfaces (two internal and one external): DMZ represents a logical second network behind the VPN-1 UTM Edge appliance. You must connect DMZ computers to the LAN ports. DMZ is a dedicated Ethernet port (RJ-45) used to connect a DMZ (Demilitarized Zone) computer or network. Alternatively, the DMZ can serve as a secondary WAN port. LAN represents the private network. LAN 1-4 Local Area Network switch: Four Ethernet ports (RJ-45) are used for connecting computers or other network devices.
36
WAN represents the external interface to the router. A WAN interface card, is a network interface card (NIC) that allows devices to connect to a wide area network. Wide Area Network (WAN): An Ethernet port (RJ-45) used for connecting your cable or xDSL modem, or for connecting a hub when setting up more than one Internet connection
Although these three interfaces automatically appear in the Topology window, they are not associated with an IP address and a Network Mask. If you deselect the Dynamic Address option in the General Properties window and add a static IP address, the WAN automatically receives the specified static IP address and its Network Mask is 255.255.255.255. The Type drop-down list in the General Properties window defines the hardware type and its associated topology. Currently all hardware types share the same topology. Every hardware type has one external interface and two internal interfaces. It is possible to add only one additional external interface. Once you have defined the general settings as well as the topology definitions of the VPN-1 UTM Edge Gateway a certificate is automatically created. Note - Pre-Shared Secrets work in conjunction with Static IP Addresses only.
For managed devices it is essential to specify the correct network. When managing multiple devices it is better to define the networks on the devices, so as to ensure that the networks do not overlap with one another. For externally managed devices the networks specified depend upon both the NAT settings on the other side as well as the agreed configuration.
Chapter 2
37
Figure 2-2
4. In the VPN-1 UTM Edge Gateway - VPN page, associate the VPN-1 UTM Edge Gateway with the VPN Community of your choice (if one already exists) (Figure 2-3). This page can only be set by closing and reopening the VPN-1 UTM Edge Gateway object. At this point a certificate is created for the VPN-1 UTM Edge Gateway. You can also add a VPN-1 Gateway to a selected VPN community by opening the VPN community directly from the VPN Manager view. To enable High Availability configure a backup gateway. Refer to Configuring High Availability section in the Check Point VPN-1 Edge Internet Security Appliance User Guide.
38
Figure 2-3
Note - To perform a detailed configuration of the created VPN-1 UTM Edge Gateway launch
the gateway in a browser. To do this, right-click the specific VPN-1 UTM Edge Gateway and select Manage Devices...
5. In the VPN-1 UTM Edge Gateway - Content Filtering page (Figure 2-4), select Use UFP, Use CVP or both if you want to restrict access to Web content and/or automatically scan your email for the detection and elimination of all known viruses and vandals, in relation to the specific gateway. Select Use Anti Virus Integrated Protection to indicate that Anti Virus is installed and that updates will be sent to this specific gateway. For Anti Virus to work on VPN-1 UTM Edge it must be configured in the Edge Anti Virus section of the SmartDashboard > Content Inspection tab. The type of UFP Server and CVP Server used for content filtering is determined in Policy > Global Properties > VPN-1 UTM Edge Gateway window.
Chapter 2
39
Figure 2-4
6. In the VPN-1 UTM Edge Gateway - Advanced page (Figure 2-5), enter the following information: Product Key enables you to remotely update the current VPN-1 UTM Edge gateway license (18 hexadecimal characters in three groups separated by hyphens). MAC Address enables stronger validation of the VPN-1 UTM Edge gateway when communicating with the SmartCenter Server. Configuration Script enables you to enter a script for relevant commands and features. The written script will be downloaded automatically and executed to the VPN-1 UTM Edge device.
For more detailed information about configuration scripts, refer to the Command Line Interface Administration Guide.
40
Figure 2-5
Chapter 2
41
The order of the creation of the VPN-1 UTM Edge objects is: 1. Create the SmartLSM VPN-1 UTM Edge ROBO gateway in SmartDashboard. See Working with VPN-1 UTM Edge Objects for SmartCenter on page 35. 2. Create a Dynamic Object in SmartDashboard. 3. Close SmartDashboard and open SmartLSM. 4. Create the VPN-1 UTM Edge ROBO Gateway that represents the VPN-1 UTM Edge appliance in SmartLSM, and associate it with a VPN-1 UTM Edge ROBO Profile. See Creating a VPN-1 UTM Edge ROBO Gateway on page 46. During this process you must assign the previously created profile to the VPN-1 UTM Edge ROBO Gateway that is being created.
In This Section
Creating a SmartLSM ROBO Profile Creating a VPN-1 UTM Edge ROBO Gateway page 43 page 46
42
2. In the General page, enter the name and an optional comment (Figure 2-7). Figure 2-7 Configure the SmartLSM Profile settings
Chapter 2
43
3. On the VPN page (Figure 2-8), enter the type of community that you would like to associate with the said profile and save the profile by closing it. Figure 2-8 Configure the SmartLSM Profile Settings for VPN
44
4. On the Content Filtering tab (Figure 2-9), select the applicable protection types. VPN-1 UTM Edge supports two different types of content filtering and antivirus protection: Integrated Products - VStream Gateway Antivirus, which is integrated into the VPN-1 UTM Edge appliance and managed locally via the Content Filtering window. Third Party Products - Centralized content filtering based on a third party solution on a central server. The CVP and UFP centralized filtering protocol are available.
You can choose to enable integrated products, third party products or both types together. Refer to the online help for a detailed explanation of these options. Select Use Anti Virus Integrated Protection to indicate that Anti Virus is installed and that updates will be sent to a specific gateway. Use the Edge Anti Virus section of the SmartDashboard > Content Inspection tab to configure antivirus protection. Select Use UFP, Use CVP or both to restrict access to Web content and/or automatically scan your email for viruses. Use the Policy > Global Properties > VPN-1 UTM Edge Gateway window to enable and configure UFP and CVP Servers. Figure 2-9 Configuring Content Filtering
Chapter 2
45
5. In the Advanced page (Figure 2-10), enter the following information: Configuration Script enables you to enter a script for relevant commands and features. The written script will be downloaded automatically and executed to the VPN-1 UTM Edge device.
For more detailed information about configuration scripts, refer to the Command Line Interface Administration Guide. Figure 2-10 Configuring Advanced Settings
46
Source Any
Destination Any
VPN Mesh-comm
Action Accept
Install On VPN1_Pro_GW
All Users or VPN-1 Devices defined as Remote Access Table 2-2 Source Edge_Net
Any
RA_comm
Accept
VPN1_Pro_GW
VPN Any
Service Any
Action Accep t
Install On Any
Chapter 2
47
2. Once the rules are complete install your Security Policy (Policy > Install Policy). The VPN-1 UTM Edge Gateway periodically fetches the Security Policy from the SmartCenter Server. When the policy installation is complete the SmartCenter Server will attempt to update the VPN-1 UTM Edge Gateway with the new security policy. In order for the changes to take place immediately you can force a Policy update from the VPN-1 UTM Edge Portal.
48
Chapter 2
49
Figure 2-11 Login to the SmartCenter Server in the VPN-1 UTM Edge Portal
During the SmartCenter Server setup, you are required to enter details about the VPN-1 UTM Edge Gateway object that you created. Note that the Gateway ID refers to the name of the said gateway and the Password refers to the Registration Key specified during the creation of the VPN-1 UTM Edge Gateway object. Figure 2-12 Configuring the Gateway object.
50
Once this setup is successfully completed, the VPN-1 UTM Edge appliance and the SmartCenter Server can communication securely. For more information about this procedure, see the relevant vendor information. Note - If your device is not installed locally, you will need to logon securely to the VPN-1 UTM Edge Portal using HTTPS (https://<current IP Address>:981). For more information see the relevant vendor information.
Chapter 2
51
In This Section
Gateway in Site-to-Site VPN Configuration Gateway in a Remote Access Client Configuration Management by an External Service Center page 52 page 55 page 57
52
Make sure that the type that you select corresponds to the actual appliance that you have in your possession. Add a Password that will be used later on the VPN-1 UTM Edge Portal and for the pre-shared secret (if you have a static IP Address).
On the Topology page (see Figure 2-2): All IP Addresses behind Gateway based on Topology information is used for NAT implementation. Manually Defined is used if the VPN-1 UTM Edge Gateway is configured for dynamic IP Address or if NAT is not being implemented.
On the VPN page (see Figure 2-3) generate the certificate and close the VPN-1 UTM Edge Gateway. 2. If you do not already have one, create a Star or Meshed community in the VPN Manager. For more about these communities and how to configure them, see the appropriate CheckPoint product suite Getting Started Guide.
In a Star Community In the Central Gateways page click Add and select the desired VPN-1 UTM Edge Gateway. Click OK.
Note - If you are creating a Star community, it is not recommended to include the VPN-1 UTM Edge Gateway as a Central Gateway. In the Satellite Gateways page, click Add and select the desired VPN-1 UTM Edge Gateway. Click OK.
Chapter 2
53
In a Meshed Community In the Participating Gateways page, click Add and select the desired VPN-1 UTM Edge Gateway. Click OK.
In Star and Meshed Communities In the VPN Properties page, specify the properties for the phases of IKE negotiation. In the Shared Secret page, specify whether the VPN community member should be authenticated using a pre-shared secret or a certificate. If you would like to use a secret, make sure to select Use only Shared Secret for all External members. The secret used is the password defined when the VPN-1 UTM Edge Gateway object was created. If you would like to use certificates as a means of authentication, make sure that Use only Shared Secret for all External members is unchecked.
3. In the Rule Base, create the rules of your Security Policy. See Creating a Security Policy for VPN-1 UTM Edge Appliance on page 47.
54
4. Install the rule base on the Central Gateways (for a Star community). 5. In the VPN-1 UTM Edge Portal define the SmartCenter server as the active service center, see Managing VPN-1 UTM Edge Devices with SmartCenter Server on page 49. In the VPN window of the VPN-1 UTM Edge Portal, the Site-to-Site configuration is automatically loaded, including its topology and enterprise profile.
When VPN-1 UTM Edge Gateways are configured to work in client mode, it is important that the SmartCenter Server be deployed outside of the VPN domain of the Remote Access Client. If you are working with Remote Access Automatic login mode, the SmartCenter Server may be within the VPN domain, however, in this case, you must create the VPN domain in the VPN-1 UTM Edge Gateway before connecting the VPN-1 UTM Edge Gateway to the SmartCenter Server. For VPN to be established the following must take place:
Chapter 2
55
1. Create a VPN-1 UTM Edge Gateway object. Make sure that you select VPN enabled and Remote Access on the General page. Remote Access means that the selected VPN Edge Gateway can act as a Remote Access client to the corporate gateway, no other gateways will be able to initiate a VPN tunnel to this VPN Edge Gateway. This VPN-1 UTM Edge Gateway can be enforced as part of a User Group in a Remote Access VPN community. If the VPN-1 UTM Edge Gateway has a static IP Address, use an IKE pre-shared secret to establish a VPN tunnel. In this case you will need to enter the password created on the VPN-1 UTM Edge Gateway object. 2. Create a RemoteAccess community in the VPN Manager that includes the VPN-1 UTM Edge Gateway object. For more about these communities and how to configure them, see the appropriate CheckPoint product suite Getting Started Guide. In the Participating Gateways page click Add and select the Central Gateway. Click OK.
In the Participant User Groups page, click Add and select VPN-1 Devices defined as Remote Access. Click OK. Figure 2-15 Add User Group
56
3. In the Rule Base, define a rule for the Remote Access community and install it on the Gateway. See Creating a Security Policy for VPN-1 UTM Edge Appliance on page 47. Install the Security Policy on the desired gateways. 4. In the VPN-1 UTM Edge Portal define the SmartCenter server as the active service center, see Managing VPN-1 UTM Edge Devices with SmartCenter Server on page 49. In the VPN window of the VPN-1 UTM Edge Portal, the Remote Access configuration is automatically loaded. Create a new Site to represent the VPN-1 Power Gateway on the VPN-1 UTM Edge appliance. On the VPN screen, click on New Site, run the wizard and perform the following steps: Add the IP Address of the regular VPN-1 Power Gateway. Check Download Configuration. Enter the name of the Site. Under VPN Login, select Automatic Login and refer to the vendor documentation for more information.
2. Modify the VPN Community to which you are adding the VPN-1 UTM Edge. Make sure that you check Use only Shared Secret for all External Members on the Advanced Settings > Shared Secret page.
Chapter 2
57
3. Modify the Security Policy, make sure that rule installed on the profile is disabled. Install the Security Policy. On the VPN-1 UTM Edge Portal on the VPN screen. Click on New Site and run the wizard and do the following steps: Add the IP Address of the regular VPN-1 Power Gateway Check Download Configuration. Configure the routing destination and subnet mask of the external service center Under Authentication, select Use shared secret. Click on Connect in order to connect to the VPN-1 Power Gateway.
3. In SmartDashboard, create a VPN Star community that includes the VPN-1 UTM Edge ROBO Gateway and the CO Gateway as follows: In the Central Gateway page, click Add. Select the CO gateway from the displayed list and click OK. In the Satellite Gateways page, click Add. Select the SmartLSM VPN-1 UTM Edge profile from the displayed list and click OK. In the VPN Properties page, specify the IKE phase properties. In the Shared Secret page, uncheck the Use only Shared secret for all External Members. Make sure that shared secret is only used for external members and set the properties for the IKE negotiations.
58
A topology file and a certificate are downloaded to the VPN-1 UTM Edge ROBO Gateway. This topology file lists the members of the VPN community and specifies the encryption information. 4. On the VPN-1 UTM Edge Portal, on the VPN screen specify the configuration type (whether Site-to-Site or Remote Access and check Download Configuration.
Chapter 2
59
60
61
The following statements refer to those portions of the software copyrighted by Jean-loup Gailly and Mark Adler Copyright (C) 1995-2002 Jean-loup Gailly and Mark Adler. This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required. 2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution. The following statements refer to those portions of the software copyrighted by the Gnu Public License. This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. The following statements refer to those portions of the software copyrighted by Thai Open Source Software Center Ltd and Clark Cooper Copyright (c) 2001, 2002 Expat maintainers. Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. GDChart is free for use in your applications and for chart generation. YOU MAY NOT re-distribute or represent the code as your own. Any re-distributions of the code MUST reference the author, and include any and all original documentation. Copyright. Bruce Verderaime. 1998, 1999, 2000, 2001. Portions copyright 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002 by Cold Spring Harbor Laboratory. Funded under Grant P41-RR02188 by the National Institutes of Health. Portions copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002 by Boutell.Com, Inc. Portions relating to GD2 format copyright 1999, 2000, 2001, 2002 Philip Warner. Portions relating to PNG copyright 1999, 2000, 2001, 2002 Greg Roelofs. Portions relating to gdttf.c copyright 1999, 2000, 2001, 2002 John Ellson ([email protected]). Portions relating to gdft.c copyright 2001, 2002 John Ellson ([email protected]). Portions relating to JPEG and to color quantization copyright 2000, 2001, 2002, Doug Becker and copyright (C) 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, Thomas G. Lane. This software is based in part on the work of the Independent JPEG Group. See the file README-JPEG.TXT for more information. Portions relating to WBMP copyright 2000, 2001, 2002 Maurice Szmurlo and Johan Van den Brande. Permission has been granted to copy, distribute and modify gd in any context without fee, including a commercial application, provided that this notice is present in user-accessible supporting documentation. This does not affect your ownership of the derived work itself, and the intent is to assure proper credit for the authors of gd, not to interfere with your productive use of gd. If you have questions, ask. "Derived works" includes all programs that utilize the library. Credit must be given in user-accessible documentation. This software is provided "AS IS." The copyright holders disclaim all warranties, either express or implied, including but not limited to implied warranties of merchantability and fitness for a particular purpose, with respect to this code and accompanying documentation. Although their code does not appear in gd 2.0.4, the authors wish to thank David Koblas, David Rowley, and Hutchison Avenue Software Corporation for their prior contributions. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 The curl license COPYRIGHT AND PERMISSION NOTICE Copyright (c) 1996 - 2004, Daniel Stenberg, <[email protected]>.All rights reserved. Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies.
62
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Except as contained in this notice, the name of a copyright holder shall not be used in advertising or otherwise to promote the sale, use or other dealings in this Software without prior written authorization of the copyright holder. The PHP License, version 3.0 Copyright (c) 1999 - 2004 The PHP Group. All rights reserved. Redistribution and use in source and binary forms, with or without modification, is permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. The name "PHP" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact [email protected]. 4. Products derived from this software may not be called "PHP", nor may "PHP" appear in their name, without prior written permission from [email protected]. You may indicate that your software works in conjunction with PHP by saying "Foo for PHP" instead of calling it "PHP Foo" or "phpfoo" 5. The PHP Group may publish revised and/or new versions of the license from time to time. Each version will be given a distinguishing version number. Once covered code has been published under a particular version of the license, you may always continue to use it under the terms of that version. You may also choose to use such covered code under the terms of any subsequent version of the license published by the PHP Group. No one other than the PHP Group has the right to modify the terms applicable to covered code created under this License. 6. Redistributions of any form whatsoever must retain the following acknowledgment: "This product includes PHP, freely available from <http://www.php.net/>". THIS SOFTWARE IS PROVIDED BY THE PHP DEVELOPMENT TEAM ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PHP DEVELOPMENT TEAM OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. This software consists of voluntary contributions made by many individuals on behalf of the PHP Group. The PHP Group can be contacted via Email at [email protected]. For more information on the PHP Group and the PHP project, please see <http://www.php.net>. This product includes the Zend Engine, freely available at <http://www.zend.com>. This product includes software written by Tim Hudson ([email protected]). THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Copyright (c) 1998, 1999, 2000 Thai Open Source Software Center Ltd
63
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Copyright 2003, 2004 NextHop Technologies, Inc. All rights reserved. Confidential Copyright Notice Except as stated herein, none of the material provided as a part of this document may be copied, reproduced, distrib-uted, republished, downloaded, displayed, posted or transmitted in any form or by any means, including, but not lim-ited to, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of NextHop Technologies, Inc. Permission is granted to display, copy, distribute and download the materials in this doc-ument for personal, non-commercial use only, provided you do not modify the materials and that you retain all copy-right and other proprietary notices contained in the materials unless otherwise stated. No material contained in this document may be "mirrored" on any server without written permission of NextHop. Any unauthorized use of any material contained in this document may violate copyright laws, trademark laws, the laws of privacy and publicity, and communications regulations and statutes. Permission terminates automatically if any of these terms or condi-tions are breached. Upon termination, any downloaded and printed materials must be immediately destroyed. Trademark Notice The trademarks, service marks, and logos (the "Trademarks") used and displayed in this document are registered and unregistered Trademarks of NextHop in the US and/or other countries. The names of actual companies and products mentioned herein may be Trademarks of their respective owners. Nothing in this document should be construed as granting, by implication, estoppel, or otherwise, any license or right to use any Trademark displayed in the document. The owners aggressively enforce their intellectual property rights to the fullest extent of the law. The Trademarks may not be used in any way, including in advertising or publicity pertaining to distribution of, or access to, materials in this document, including use, without prior, written permission. Use of Trademarks as a "hot" link to any website is prohibited unless establishment of such a link is approved in advance in writing. Any questions concerning the use of these Trademarks should be referred to NextHop at U.S. +1 734 222 1600. U.S. Government Restricted Rights The material in document is provided with "RESTRICTED RIGHTS." Software and accompanying documentation are provided to the U.S. government ("Government") in a transaction subject to the Federal Acquisition Regulations with Restricted Rights. The Government's rights to use, modify, reproduce, release, perform, display or disclose are restricted by paragraph (b)(3) of the Rights in Noncommercial Computer Software and Noncommercial Computer Soft-ware Documentation clause at DFAR 252.227-7014 (Jun 1995), and the other restrictions and terms in paragraph (g)(3)(i) of Rights in Data-General clause at FAR 52.227-14, Alternative III (Jun 87) and paragraph (c)(2) of the Commer-cial Computer Software-Restricted Rights clause at FAR 52.227-19 (Jun 1987). Use of the material in this document by the Government constitutes acknowledgment of NextHop's proprietary rights in them, or that of the original creator. The Contractor/Licensor is NextHop located at 1911 Landings Drive, Mountain View, California 94043. Use, duplication, or disclosure by the Government is subject to restrictions as set forth in applicable laws and regulations. Disclaimer Warranty Disclaimer Warranty Disclaimer Warranty Disclaimer Warranty THE MATERIAL IN THIS DOCUMENT IS PROVIDED "AS IS" WITHOUT WARRANTIES OF ANY KIND EITHER EXPRESS OR IMPLIED. TO THE FULLEST EXTENT POSSIBLE PURSUANT TO THE APPLICABLE LAW, NEXTHOP DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NON INFRINGEMENT OR OTHER VIOLATION OF RIGHTS. NEITHER NEXTHOP NOR ANY OTHER PROVIDER OR DEVELOPER OF MATERIAL CONTAINED IN THIS DOCUMENT WARRANTS OR MAKES ANY REPRESEN-TATIONS REGARDING THE USE, VALIDITY, ACCURACY, OR RELIABILITY OF, OR THE RESULTS OF THE USE OF, OR OTHERWISE RESPECTING, THE MATERIAL IN THIS DOCUMENT. Limitation of Liability
64
UNDER NO CIRCUMSTANCES SHALL NEXTHOP BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES, INCLUDING, BUT NOT LIMITED TO, LOSS OF DATA OR PROFIT, ARISING OUT OF THE USE, OR THE INABILITY TO USE, THE MATERIAL IN THIS DOCUMENT, EVEN IF NEXTHOP OR A NEXTHOP AUTHORIZED REPRESENTATIVE HAS ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IF YOUR USE OF MATERIAL FROM THIS DOCUMENT RESULTS IN THE NEED FOR SERVICING, REPAIR OR CORRECTION OF EQUIPMENT OR DATA, YOU ASSUME ANY COSTS THEREOF. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMITATION OR EXCLUSION MAY NOT FULLY APPLY TO YOU. Copyright ComponentOne, LLC 1991-2002. All Rights Reserved. BIND: ISC Bind (Copyright (c) 2004 by Internet Systems Consortium, Inc. ("ISC")) Copyright 1997-2001, Theo de Raadt: the OpenBSD 2.9 Release PCRE LICENCE PCRE is a library of functions to support regular expressions whose syntax and semantics are as close as possible to those of the Perl 5 language. Release 5 of PCRE is distributed under the terms of the "BSD" licence, as specified below. The documentation for PCRE, supplied in the "doc" directory, is distributed under the same terms as the software itself. Written by: Philip Hazel <[email protected]> University of Cambridge Computing Service, Cambridge, England. Phone: +44 1223 334714. Copyright (c) 1997-2004 University of Cambridge All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of the University of Cambridge nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Eventia Reporter includes software whose copyright is owned by, or licensed from, MySQL AB.
65
66
Index
A
Access Control 26, 32, 33 active service center 55 Anti-spoofing 23 Appliance Before You Begin 31 installing 30 managed by External Service Center 26 supported 22 VPN, Site-to-Site, Remote Access 25 W-series 22 X-series 22 Audit view 59 authentication 35 authentication capabilities 23
E
Enable SmartLSM run LSMenabler 33 encryption 35 Ethernet port 36 external interface 37 External Service Center 57 Extranet scenarios 26
L
LAN 36 LAN ports 36 large-scale VPN deployments 18 license string 40 Licensing 32, 33
F
firmware 27, 60 ftp 47
M
MAC address 40 Managed Service Providers 20 management operations 49 Management Settings 35 Management Solutions 30 SmartCenter, Provider1,SmartLSM 18 Managing VPN-1 UTM Edge Devices 49 MDS server 57 Meshed Community 52, 53 meshed Site-to-Site communities 58 multi-ISPs 22
G C
centralized management tool 27 Check Point internal certificates 58 Check Point management solutions 22 Check Points Stateful Inspection 26 client mode 55 Configuration Script 40, 46 connectivity 17 content filtering 39 Corporate Office (CO) Gateway 58 CVP Server 39, 45 Global VPN Communities 20
H
hardware type 37 High Availability 38 high performance 22 http 47 //my.firewall connecting to 24
N I
IKE authentication 58 IKE negotiation 54 IKE phase properties 58 IKE pre-shared secret 52, 56 initial administrator permissions 31 NAT implementation 53 NAT settings 37 Network Objects 35, 43 NIC 37
D
DMZ 36 dynamic IP Address 52, 53 Dynamic Object 33, 42, 58
February 2007
67
O
Objects Tree 35
P
PKI 52 PN-1 Edge appliance 42 profile 44 Protocol SWTP_Gateway 24 SWTP_SMS 24 Provider-1 16, 20 Provider-1 CMA 20
R
Remote Access 25 default User group 25 Remote Access Client 23, 52, 55, 56 Remote Access Community 25, 47, 52, 55, 57 Remote Access VPN configure 55 Remote Access VPN community 56 remote client 25 Remote Login 51 ROBO 19 Rule Base 26, 54, 57
S
secure connectivity 16 Security 17, 18 Security Policy 17, 23, 26, 32, 33, 48, 49, 57, 58 actions 26 define 47 download 49 install & uninstall 48 verify download 49 security policy 43 Security Policy rules 47
Service Center 57 SIC 24 Site-to-Site 25, 47 Site-to-Site configuration 33, 55 Site-to-Site VPN 25 configure 52 Smart LSM VPN-1 UTM Edge Profiles 33 SMART management 18 SmartCenter 16, 18 SmartCenter management 24 SmartCenter Power 33 SmartCenter Server 46 connecting to 24 SmartCenter server 51 SmartCenter Server setup 50 SmartCenter UTM 25 SmartConsole clients 23 SmartLSM 16, 18, 19, 27, 33, 46, 58 SmartLSM management solution 42 SmartLSM VPN-1 UTM Edge Profile 42, 58 SmartLSM VPN-1 UTM Edge ROBO Profile create 43 SmartUpdate 27, 60 download firmware 60 upgrading firmware 27 SmartView Monitor 27 SmartView Status monitoring the status 27 SmartView Tracker 26, 59 creating logs 26 view logs 59 Star Community 33, 52, 53 Stateful Inspection 23 static IP Address 52, 56 subnet mask 58
U
UFP Server 39, 45
V
VPN configure 52 VPN community 23, 30, 35, 38, 47 VPN configuration in SmartLSM 58 VPN Manager 53, 56 VPN relations 32, 33 VPN settings 35 VPN solutions 16, 18 VPN Star community 58 VPN tunnel 52 VPN-1 gateway 27 VPN-1 Power 17, 27 VPN-1 Power gateway 22 VPN-1 UTM Edge 16, 32, 35 VPN-1 UTM Edge Appliance 35, 46, 49 VPN-1 UTM Edge appliance 24, 26, 31, 51 VPN-1 UTM Edge appliances 27 VPN-1 UTM Edge device 40, 46 VPN-1 UTM Edge Gateway 18, 26, 38, 40, 47, 52, 60 create 35 VPN-1 UTM Edge Gateway object 35, 50 VPN-1 UTM Edge Gateways 25 VPN-1 UTM Edge logs 26 VPN-1 UTM Edge object 32 VPN-1 UTM Edge Portal 24, 32, 33, 49, 53, 55 VPN-1 UTM Edge Profile 24, 35 VPN-1 UTM Edge ROBO 19 VPN-1 UTM Edge ROBO Gateway 33, 42, 46, 58 create 46 VPN-1 UTM module 17 VPN-1/FireWall-1 technology 22
T
telnet 47 topology 37
68
W
WAN 37 WAN interface card 37 WAN port 36 Web content 39, 45 Web GUI 31 Workflow SmartCenter management 32 SmartLSM Management 33 using the appliance 24
X
xDSL modem 37
69
70