CP R80 SecurityManagement AdminGuide
CP R80 SecurityManagement AdminGuide
R80
Administration Guide
Classification: [Protected]
2016 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and
distributed under licensing restricting their use, copying, distribution, and decompilation. No part
of this product or related documentation may be reproduced in any form or by any means without
prior written authorization of Check Point. While every precaution has been taken in the
preparation of this book, Check Point assumes no responsibility for errors or omissions. This
publication and features described herein are subject to change without notice.
RESTRICTED RIGHTS LEGEND:
Use, duplication, or disclosure by the government is subject to restrictions as set forth in
subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS
252.227-7013 and FAR 52.227-19.
TRADEMARKS:
Refer to the Copyright page http://www.checkpoint.com/copyright.html for a list of our
trademarks.
Refer to the Third Party copyright notices http://www.checkpoint.com/3rd_party_copyright.html
for a list of relevant copyrights and third-party licenses.
Important Information
Check Point R80
For more about this release, see the R80 home page
http://supportcontent.checkpoint.com/solutions?id=sk108623.
Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments
mailto:[email protected]?subject=Feedback on Check Point
Security Management R80 Administration Guide.
Revision History
Date Description
17 May 2016 Updated The Security Management Server CLI (on page 151)
Terms
Group of files, and data about those files,
delivered as one software archive (usually
TGZ or RPM), for distribution and installation.
Administrator
Permissions Profile
A SmartConsole user with permissions to
A set of access, and feature-based roles for
manage Check Point security products and
SmartConsole administrators.
the network environment.
Policy
Administrator Groups
A collection of rules that control network
Named groups of administrators with
traffic and enforce organization guidelines
permissions to install policies on specified
for data protection and access to resources
gateways.
with packet inspection.
Database
Rule Base
The Check Point database includes all
The database that contains the rules in a
objects, including network objects, users,
security policy and defines the sequence in
services, servers, and protection profiles.
which they are enforced.
External Users
Security Gateway
Users defined on external servers. External
A computer or appliance that inspects traffic
users are not defined in the Security
and enforces Security Policies for connected
Management Server database or on an LDAP
network resources.
server. External user profiles tell the system
how to identify and authenticate externally
Security Management Server
defined users.
The server that manages, creates, stores,
Identity Awareness and distributes the security policy to Security
Gateways.
Lets you enforce network access and audit
data based on network location, the identity
SIC
of the user, and the identity of the computer.
Secure Internal Communication. The process
LDAP by which networking components
authenticate over SSL between themselves
Lightweight Directory Access Protocol. An
and the Security Management Server, as the
open industry standard for user and device
Internal Certificate Authority (ICA), for secure
data storage and directory-access.
communication. The Security Management
LDAP Groups Server issues a certificate, which
components use to validate the identity of
Groups of users defined on an LDAP account others.
unit.
SmartConsole
Log Server
A Check Point GUI application used to
Physical server that hosts Check Point manage security policies, monitor products
product log files. and events, install updates, provision new
devices and appliances, and manage a
Management Server
multi-domain environment.
A Security Management Server or
Multi-Domain Server that manages one or SmartDashboard
more Security Gateways and security A legacy Check Point client used to create
policies. and manage the security policy.
Software Blade
A software blade is a security solution based
on specific business needs.
Each blade is independent, modular and
centrally managed. To extend security,
additional blades can be quickly added.
User Database
Check Point internal database that contains
all users and administrators defined and
managed in SmartConsole.
User Groups
Named groups of users with related
responsibilities.
User Template
Property set that defines a type of user on
which a security policy will be enforced.
Users
Personnel authorized to use network
resources and applications.
Welcome
Welcome
Check Point offers effective Security Management solutions to help you keep up with constantly
growing needs and challenges of your organizational network. This Administration Guide focuses
on the basic Security Management Server deployment.
If you are interested in deployments for organizations with multiple sites, refer to the R80
Multi-Domain Server Administration Guide
http://supportcontent.checkpoint.com/documentation_download?ID=46532.
These are the basic components of Check Point security architecture.
Item Description
1 Your environment to protect.
2 Security Management Server - Manages Security Gateways with defined security policies
and monitors security events on the network.
3 SmartConsole - Check Point Graphical User Interface for connection to and management
of Security Management Servers.
4 Security Gateway - Placed at the perimeter of the network topology, to protect your
environment through enforcement of the security policies.
Getting Started
In This Section:
Understanding SmartConsole .....................................................................................12
Connecting to the Security Management Server through SmartConsole .................18
Setting Up for Security Management ..........................................................................18
Setting up for Team Work ............................................................................................19
Managing Security through API and CLI .....................................................................19
Planning Security Management ...................................................................................20
Before you begin deploying a Check Point security solution, familiarize yourself with:
Check Point SmartConsole
Basic setup of a Check Point Security Management Server
Basic setup of Check Point Security Gateways
Administrative task delegation
Security management in a non-GUI environment
Understanding SmartConsole
Check Point SmartConsole makes it easy to manage security for complex networks. Before you
start to configure your network security environment and policies, become familiar with Check
Point SmartConsole.
Tour of SmartConsole
For a guided tour of SmartConsole, click the What's New button at the bottom left of the
window. Click the < and > icons to scroll between the different What's New screens.
SmartConsole Toolbars
Global Toolbar (top of SmartConsole)
Description
The main SmartConsole Menu:
Manage policies
Manage layers
Open Object Explorer
New object (opens menu to create a new object)
Publish session
Discard session
Session details
Install policy
Verify policy
Install Database
Uninstall Threat policy
Management High Availability
Manage Licenses and Packages
Global Properties
View (opens menu to select a View to open)
Enter Session Details
Create new objects or open the Object Explorer
Enter session details and see the number of changes made in the session
Commit policy changes to the database and make them visible to other
administrators
Note - The changes are saved on the gateways and enforced after the next
policy install
Keyboard Description
Shortcut
Ctrl+4 Manage & Settings view - review and configure the Security
Management Server settings:
Administrators - connected and disconnected
Permissions profiles
Trusted clients
Sessions
Blades
Revisions
Network management preferences
Idle timeout
Login message
Server Details See the IP address of the server to which SmartConsole is connected
Status of See the number of changes made in the session and their status
Changes
Search Engine
In each view you can search the Security Management Server database for information relevant to
the view. For example:
Gateway, by name or IP address
Access Control rule
NAT rule
Threat Prevention profile
Specific threat or a threat category
Object tags
Tool Description
VPN Communities Create, edit, or delete VPN Communities.
Client Certificates Create and distribute client certificates that allow users to authenticate
to the Gateway from handheld devices.
Application Wiki Browse to the Check Point AppWiki. Search and filter the Web 2.0
Applications Database, to use Check Point security research in your
policy rules for actions on applications, apps, and widgets.
Installation History See the Policy installation history for each Gateway, and who made the
changes. See the revisions that were made during each installation, and
who made them. Revert to a specific version of the Policy.
Tool Description
Profiles Create, edit, or delete profiles.
Tool Description
Updates Configure updates to the Malware database, Threat Emulation engine
and images, and the IPS database.
Threat Wiki Browse to the Check Point ThreatWiki. Search and filter Check Point's
Malware Database, to use Check Point security research to block
malware before it enters your environment, and to best respond if it does
get in.
Shared Policies
The Shared Policies section in the Security Policies view gives access to granular Software
Blades.
Shared policies are installed with the Access Control Policy.
Geo Policy Create a policy for traffic to or from specific geographical or political
locations.
HTTPS Policy The HTTPS Policy allows the Security Gateway to inspect HTTPS traffic
to prevent security risks related to the SSL protocol. To launch the
HTTPS Policy, click Manage & Settings > Blades > HTTPS Inspection >
Configure in SmartDashboard
Open the Command Line Reference to learn about Session management commands,
Host commands, Network commands, and Rule commands.
In addition to the command line interface, you can create and run API scripts to manage
configuration and operations on the Security Management Server. See Managing Security with the
API and CLI ("Managing Security through API and CLI" on page 19).
Define users and user groups that your security environment protects
You can add users ("Creating, Modifying, Removing User Accounts" on page 100) and groups
("Managing User Groups" on page 103) to the database manually, through LDAP and User
Directory (on page 104), or with the help of Active Directory ("Microsoft Active Directory" on page
124).
To successfully manage security for a large network, we recommend that you first set up your
administrative team, and delegate tasks.
To create a Certificate:
In the Certificate Information section, click Create, enter a password, and save the certificate
to a secure location.
5. Select a Permissions profile for this administrator, or create a new one ("Creating and
Changing Permission Profiles" on page 24).
6. Set the account Expiration date:
For a permanent administrator - select Never
For a temporary administrator - select an Expire At date from the calendar
The default expiration date shows, as defined in the Default Expiration Settings ("Configuring
Default Expiration Settings for Users" on page 102). After the expiration date, the account is no
longer authorized to access network resources and applications.
7. Optional: Configure Additional Info - Contact Details, Email and Phone Number of the
administrator.
8. Click OK.
Deleting an Administrator
To make sure your environment is secure, it is best practice to delete administrator accounts
when personnel leave or transfer.
Permissions:
Not selected - The administrator cannot see the feature.
Note - If you cannot clear a feature selection, the administrator access to it is mandatory and
you cannot make it invisible
Selected - The administrator can see the feature.
Read - The administrator can see the feature but cannot make changes.
Write - The administrator can see the feature and make changes.
Some resources do not have the Read or Write option. You can only select (for full permissions) or
clear (for no permissions) these resources.
Events and Reports - configure permissions for SmartEvent features ("Permissions for
Monitoring, Logging, Events, and Reports" on page 26).
Others - configure permissions for Common Objects, user databases, HTTPS Inspection
features, and Client Certificates.
3. If this profile is for administrators with permissions to manage other administrator accounts,
in the Management section, select Manage Administrators.
4. If this profile is for administrators with permissions to manage sessions, in the Management
section, select Manage Sessions.
5. Click OK.
Administrator Collaboration
More than one administrator can connect to the Security Management Server at the same time.
Every administrator has their own username, and works in a session that is independent of the
other administrators.
When an administrator logs in to the Security Management Server through SmartConsole, a new
editing session starts. The changes that the administrator makes during the session are only
available to that administrator. Other administrators see a lock icon on object and rules that are
being edited.
To make changes available to all administrators, and to unlock the objects and rules that are
being edited, the administrator must publish the session.
Publishing
To make your changes available to other administrators, and to save the database before
installing a policy, you must publish the session. When you publish a session, a new database
version is created.
When you select Install Policy, you are prompted to publish all unpublished changes. You cannot
install a policy if the included changes are not published.
Before you publish the session, you can add some informative attributes to it.
You can exit SmartConsole without publishing your changes You will see the changes next time
you log into SmartConsole.
To publish a session:
In the SmartConsole toolbar, click Publish.
When a session is published, a new database version is created and shows in the list of database
revisions.
Note - Before you upgrade the Security Management Server, you must save the database.
To publish a session:
In the SmartConsole toolbar, click Publish.
When you publish a session, a new database version is created and shows in the list of database
revisions.
Note - Before you upgrade the Security Management Server, you must save the database.
To delete all versions of the database that are older than the selected version:
1. In the Manage & Settings > Revisions window, select a session.
2. Click Purge.
3. In the confirmation window that opens, click Yes.
Important - Deletion is irreversible. Older revisions are deleted permanently.
e) In the Shared Secret field, type the secret key that you defined previously on the TACACS
server.
f) Click OK.
3. Add a new administrator:
a) Go to Manage & Settings > Permissions & Administrators > Administrators.
b) Click New.
The New Administrator window opens.
c) Give the administrator the name that is defined on the TACACS server.
d) Assign a Permission Profile.
e) In Authentication method, select TACACS.
f) Select the TACACS Server defined earlier.
g) Click OK.
4. Click Publish.
Managing Gateways
In This Section:
Creating a New Security Gateway................................................................................34
Updating the Gateway Topology ...................................................................................35
Secure Internal Communication (SIC) .........................................................................35
Check Point Hosts ........................................................................................................38
A Security Gateway enforces security policies configured on the Security Management Server.
Initializing Trust
To establish the initial trust, a gateway and a Security Management Server use a one-time
password. After the initial trust is established, further communication is based on security
certificates.
Note - Make sure the clocks of the gateway and Security Management Server are synchronized,
before you initialize trust between them. You can control the Time and Date settings of Check
Point gateways and servers with cpconfig.
To initialize Trust:
1. In SmartConsole, open the gateway network object.
2. In the General Properties page of the gateway, click Communication.
3. In the Communication window, enter the Activation Key that you created during installation.
This one-time activation password must be on both the gateway and the Security Management
Server.
4. Click Initialize.
The ICA signs and issues a certificate to the gateway.
Trust state is Initialized but not trusted. The Internal Certificate Authority (ICA) issues a
certificate for the gateway, but does not yet deliver it.
Check Point Security Management Administration Guide R80 | 35
Managing Gateways
The two communicating peers authenticate over SSL with the shared Activation Key. The
certificate is downloaded securely and stored on the gateway. The Activation Key is deleted.
The gateway can communicate with Check Point nodes that have a security certificate signed
by the same ICA.
SIC Status
After the gateway receives the certificate issued by the ICA, the SIC status shows if the Security
Management Server can communicate securely with this gateway:
Communicating - The secure communication is established.
Unknown - There is no connection between the gateway and Security Management Server.
Not Communicating - The Security Management Server can contact the gateway, but cannot
establish SIC. A message shows more information.
Trust State
If the Trust State is compromised (keys were leaked, certificates were lost) or objects changed
(user leaves, open server upgraded to appliance), reset the Trust State. When you reset Trust, the
SIC certificate is revoked.
The Certificate Revocation List (CRL) is updated for the serial number of the revoked certificate.
The ICA signs the updated CRL and issues it to all gateways during the next SIC connection. If two
gateways have different CRLs, they cannot authenticate.
In SmartConsole:
1. In the General Properties window of the gateway, click Communication.
2. In the Trusted Communication window, enter the one-time password (activation key) that you
entered on the Security Management Server.
3. Click Initialize.
4. Wait for the Certificate State field to show Trust established.
5. Click OK.
Troubleshooting SIC
If SIC fails to Initialize:
1. Make sure there is connectivity between the gateway and Security Management Server.
2. Make sure that the Security Management Server and the gateway use the same SIC activation
key (one-time password).
3. If the Security Management Server is behind a gateway, make sure there are rules that allow
connections between the Security Management Server and the remote gateway. Make sure
Anti-spoofing settings are correct.
4. Make sure the name and the IP address of the Security Management Server are in the
/etc/hosts file on the gateway.
If the IP address of the Security Management Server mapped through static NAT by its local
gateway, add the public IP address of the Security Management Server to the /etc/hosts file
on the remote gateway. Make sure the IP address resolves to the server's hostname.
5. Make sure the date and the time settings of the operating systems are correct. If the Security
Management Server and remote the gateway reside in different time zones, the remote
gateway may have to wait for the certificate to become valid.
6. Remove the security policy on the gateway to let all the traffic through: In the command line
interface of the gateway, type: fw unloadlocal
7. Try to establish SIC again.
ICA Clients
In most cases, certificates are handled as part of the object configuration. To control the ICA and
certificates in a more granular manner, you can use one of these ICA clients:
The Check Point configuration utility - This is the cpconfig CLI utility. One of the options
creates the ICA, which issues a SIC certificate for the Security Management Server.
SmartConsole - SIC certificates for Security Gateways and administrators, VPN certificates,
and user certificates.
ICA Management tool - VPN certificates for users and advanced ICA operations ("The ICA
Management Tool" on page 155).
See audit logs of the ICA in SmartConsole Logs & Monitor > New Tab > Open Audit Logs View.
To learn more about key size values, see RSA key lengths
http://supportcontent.checkpoint.com/solutions?id=sk96591.
Managing Objects
In This Section:
Object Categories .........................................................................................................39
Adding, Editing, Cloning, Deleting, and Replacing Objects ........................................40
Object Tags ....................................................................................................................40
Network Object Types...................................................................................................41
Network Objects, defined in SmartConsole and stored in the proprietary Check Point object
database, represent physical and virtual network components (such as gateways, servers, and
users), and logical components (such as IP address ranges and Dynamic Objects). Before you
create Network Objects, analyze the needs of your organization:
What are the physical components of your network: devices, hosts, gateways and their active
Software Blades?
What are the logical components: services, resources, applications, ranges?
Who are the users? How should you group them, and with what permissions?
Object Categories
Objects in SmartConsole represent networks, devices, protocols and resources. SmartConsole
divides objects into these categories:
To clone an object:
1. In the object tree or in the Object Explorer, right-click the object and select Clone.
The Clone Object window opens.
2. Enter a name for the cloned object.
3. Click OK.
Object Tags
Object tags are keywords or labels that you can assign to network objects or groups of objects for
search purposes.
IPS protections have pre-defined tags. Use the tags
When configuring a Threat Prevention Profile, to determine which protections are activated.
As search filters, when searching the list of IPS protections.
You cannot add, change or remove tags on IPS protections.
3. Press Enter.
The new tag shows to the right of the Add Tag field.
4. Click OK.
Networks
A Network is a group of IP addresses defined by a network address and a net mask. The net mask
indicates the size of the network.
A Broadcast IP address is an IP address which is destined for all hosts on the specified network. If
this address is included, the Broadcast IP address will be considered as part of the network.
Network Groups
A network group is a collection of hosts, gateways, networks or other groups.
Groups are used where you cannot work with single objects, e.g. when working with VPN domains
or with topology definitions.
Groups facilitate and simplify network management. Modifications are applied to the group
instead of each member of the group.
license and synchronizes with the Check Point User Center. If the Security Management Server
loses Internet connectivity before the license is activated, it tries again, on an interval.
If the administrator makes changes to Management Software Blade licenses of an R80 Security
Management Server in the Check Point User Center, these changes are automatically
synchronized with that Security Management Server.
Note -
Automatic activation is supported on Check Point appliances only.
Automatic synchronization is supported on all R80 servers.
To make sure that your environment is synchronized with the User Center, even when the Security
Management Server is not connected to the Internet, we recommend that you configure an R80
Check Point server with Internet connectivity as a proxy.
In SmartConsole, you can see this information for most Software Blade licenses:
License status
Alerts
Check Point User Center details
See the R80 Release Notes for a list of supported Software Blades
Viewing Licenses
To view license information:
In SmartConsole, go to the Gateways & Servers view, and from the Columns drop-down list,
select Licenses.
You can see this information:
License Status - The general state of the Software Blade licenses:
OK - All the blade licenses are valid.
Not Activated - Blade licenses are not installed. This is only possible in the first 15 days
after the establishment of the SIC with the Security Management Server. After the initial 15
days, the absence of licenses will result in the blade error message.
Error with <number> blade(s) - The specified number of blade licenses are not installed or
not valid.
Warning with <number> blade(s) - The specified number of blade licenses have warnings.
N/A - No available information.
CK (Certificate Key) - Unique key of the license instance.
SKU - Catalog ID from the Check Point User Center.
Monitoring Licenses
To keep track of license issues, you can use:
License Inventory Report - Shows the status of each Software Blade, gateway, and server
license, including warnings and critical issues. You can filter the list of devices and export the
report to a file.
License Status View - Shows the license status for all gateways and servers with the option to
click and see more details for each device.
In the License Inventory Report and License Status View, you can also see the Next Expiration
Date, which is the closest expiration date of one or more of the Software Blades.
The SmartEvent blade allows you to customize the License Status View and License Inventory
Report from the Logs & Monitor view of SmartConsole. It is also possible to view license
information from the Gateways & Servers view of SmartConsole without the SmartEvent blade.
To see the License Inventory report from the Logs & Monitor view:
1. In the Logs & Monitor view of SmartConsole, open a new tab.
2. Select Reports.
3. Double-click License Inventory.
The License Inventory report opens.
To see the License Inventory report from the Gateways & Servers view:
From the Gateways & Servers view, click Actions > License Report.
Gateway Cluster
A gateway cluster is a group of Security Gateways with Cluster software installed: ClusterXL, or
another Clustering solution. Clustered gateways add redundancy through High Availability or Load
Sharing.
Domains
A Domain object lets you define a host or DNS domain by its name only. You do not need the IP
address of the site.
The format of the name is x.y. For example mysite.com or mysite.co.uk.
A period separates each section of the name.
For successful resolution to an IP address, the specified domain name must be an actual
domain name.
Name resolution takes place on the Security Gateway, and the result is cached for reuse.
You can also configure the domain object to represent a pattern that will watch all sub-domains.
For example: *.mysite.com. This partial domain name will match all sub-domains of
mysite.com.
Note - The gateway resolves partial names using DNS reverse lookups, which can be inaccurate
and take some time.
After defining a domain object, you can use it in the source and destination columns of an access
policy.
Dynamic Objects
A dynamic object is a "logical" object where the IP address will be resolved differently per Security
Gateway using the dynamic_objects command.
Dynamic Objects are predefined for:
LocalMachine-all-interfaces - The DAIP machine interfaces (static and dynamic) are resolved
into this object.
LocalMachine - The external interface (dynamic) of the SmartLSM Security Gateway (as
declared in cpconfig when configuring the gateway).
InternalNet - The internal interface of the SmartLSM Security Gateway (as declared in
cpconfig when configuring the gateway).
AuxiliaryNet - The auxiliary interface of the SmartLSM Security Gateway (as declared in
cpconfig when configuring the gateway).
DMZNet - The DMZ interface of the SmartLSM Security Gateway (as declared in cpconfig
when configuring the gateway).
For more information see the Command Line Interface Reference Guide
http://supportcontent.checkpoint.com/documentation_download?ID=24833.
Interoperable Devices
An Interoperable Device is a device that has no Check Point Software Blades installed. The
Interoperable Device:
Cannot have a policy installed on it
Can participate in Check Point VPN communities and solutions.
VoIP Domains
There are five types of VoIP Domain objects:
VoIP Domain SIP Proxy
VoIP Domain H.323 Gatekeeper
VoIP Domain H.323 Gateway
VoIP Domain MGCP Call Agent
VoIP Domain SCCP CallManager
In many VoIP networks, the control signals follow a different route through the network than the
media. This is the case when the call is managed by a signal routing device. Signal routing is done
in SIP by the Redirect Server, Registrar, and/or Proxy. In SIP, signal routing is done by the
Gatekeeper and/or gateway.
Enforcing signal routing locations is an important aspect of VoIP security. It is possible to specify
the endpoints that the signal routing device is allowed to manage. This set of locations is called a
VoIP Domain. For more information refer to Command Line Interface Reference Guide
http://supportcontent.checkpoint.com/documentation_download?ID=24833.
Logical Servers
A Logical Server is a group of machines that provides the same services. The workload of this
group is distributed between all its members.
When a Server group is stipulated in the Servers group field, the client is bound to this physical
server. In Persistent server mode the client and the physical server are bound for the duration of
the session.
Persistency by Service once a client is connected to a physical server for a specified service,
subsequent connection to the same Logical Server and the same service will be redirected to
the same physical server for the duration of the session.
Persistency by Server once a client is connected to a physical server, subsequent
connections to the same Logical Server (for any service) will be redirected to the same
physical server for the duration of the session.
Balance Method
The load balancing algorithm stipulates how the traffic is balanced between the servers. There are
several types of balancing methods:
Server Load The Security Gateway determines which Security Management Server is best
equipped to handle the new connection.
Round Trip Time On the basis of the shortest round trip time between Security Gateway and
the servers, executed by a simple ping, the Security Gateway determines which Security
Management Server is best equipped to handle the new connection.
Round Robin the new connection is assigned to the first available server.
Random the new connection is assigned to a server at random.
Domain the new connection is assigned to a server based on domain names.
Policy Management
In This Section:
Working with Policy Packages .....................................................................................48
Viewing Rule Logs.........................................................................................................52
Installing and Publishing ..............................................................................................52
Policy Installation History ............................................................................................53
Introducing Policy Layers .............................................................................................53
Managing Policy Layers................................................................................................54
SmartConsole offers a number of tools that address policy management tasks, both at the
definition stage and for maintenance.
At the definition stage:
Policy Packages let you group different types of policies, to be installed together on the same
installation targets.
Predefined Installation Targets let you associate each package with a set of gateways. You do
not have to repeat the gateway selection process each time you install a Policy Package.
At the maintenance level:
Search gives versatile search capabilities for network objects and the rules in the Rule Base.
Database version control lets you track past changes to the database.
Example:
An organization has four sites, each with its own requirements. Each site has a different set of
Software Blades installed on the Security Gateways:
5 Internet
To manage these different types of sites efficiently, you need to create three different Policy
Packages. Each Package includes a combination of policy types that correspond to the Software
Blades installed on the site's gateway. For example:
A policy package that includes the Access Control policy type. The Access Control policy type
controls the firewall, NAT, Application Control and URL Filtering, and Data Awareness blades.
This package also determines the VPN configuration.
Install the database Modified network objects, such as servers, users, services, or IPS profiles,
but not the Rule Base.
Updates are installed on management servers and log servers.
Validation Errors
The validations pane in SmartConsole shows configuration error messages. Examples of errors
are object names that are not unique, and the use of objects that are not valid in the Rule Base.
To publish, you must fix the errors.
Check Point Security Management Administration Guide R80 | 52
Policy Management
Unified Policy
In R80 the Access Control policy unifies the policies of these pre-R80 Software Blades:
Firewall and VPN
Application Control and URL Filtering
Identity Awareness
Data Awareness
Mobile Access
Security Zones
You can create Access Control policy rules that are based on:
Services
Protocols
Applications
URLs
File types
Data types
The information on connections is collected in one log file from all the Software Blades.
Field Description
No. Rule number in the Rule Base Layer.
Action Action that is done when traffic matches the rule. Options include: Accept,
Drop, Ask, Inform (UserCheck message), and Reject.
Track Tracking and logging action that is done when traffic matches the rule.
Install On Network objects that will get the rule(s) of the policy.
Explicit rules
The rules that the administrator configures explicitly, to allow or to block traffic based on
specified criteria.
Important - The Cleanup rule is a default explicit rule and is added with every new layer.
You can change or delete the default Cleanup rule. We recommend that you have an
explicit cleanup rule as the last rule in each layer.
Implied rules
The default rules that are available as part of the Global properties configuration and cannot be
edited. You can only select the implied rules and configure their position in the Rule Base:
First - Applied first, before all other rules in the Rule Base - explicit or implied
Last - Applied last, after all other rules in the Rule Base - explicit or implied, but before the
Implicit Cleanup Rule
Before Last - Applied before the last explicit rule in the Rule Base
Check Point Security Management Administration Guide R80 | 56
Introducing the Access Control Policy
Implied rules are configured to allow connections for different services that the Security Gateway
uses. For example, the Accept Control Connections rules allow packets that control these
services:
Installation of the security policy on a Security Gateway
Sending logs from a Security Gateway to the Security Management Server
Connecting to third party application servers, such as RADIUS and TACACS authentication
servers
New Access Control Policy for pre-R80 Security Gateways on an R80 Security
Management Server must have this structure:
1. The first Policy Layer is the Network Layer (with the Firewall blade enabled on it).
2. The second Policy Layer is the Application Control and URL Filtering Layer (with the
Application & URL Filtering blade enabled on it).
3. There are no other Policy Layers.
If the Access Control Policy has a different structure, the policy will fail to install.
You can change the names of the Layers, for example, to make them more descriptive.
Each new Policy Layer will have the explicit default rule, added automatically and set to Drop all
the traffic that does not match any rule in that Policy Layer. We recommend that the Action is set
to Drop for the Network Policy Layer and Accept for the Application Control Policy Layer.
If you remove the default rule, the Implicit Cleanup Rule will be enforced. The Implicit Cleanup
Rule is configured in the Policy configuration window and is not visible in the Rule Base table.
Make sure the Implicit Cleanup Rule is configured to Drop the unmatched traffic for the Network
Policy Layer and to Accept the unmatched traffic for the Application Control Policy Layer.
Important - Always add an explicit Default Cleanup Rule at the end of each Policy Layer,
and make sure that its Action is the same as the Action of the Implicit Cleanup Rule.
Order in which the rules in each Access Control Policy Layer are applied:
1. First Implied Rule - No explicit rules can be placed before it.
2. Explicit Rules - These are the rules that you create.
3. Before Last Implied Rules - Applied before the last explicit rule.
4. Last Explicit Rule - We recommend that you use a Cleanup rule as the last explicit rule.
Note - If you use the Cleanup rule as the last explicit rule, the Last Implied Rule and the
Implicit Cleanup Rule are not enforced.
5. Last Implied Rule - Remember that although this rule is applied after all other explicit and
implied rules, the Implicit Cleanup Rule is still applied last.
6. Implicit Cleanup Rule - The default rule that is applied if none of the rules in the Policy Layer
match.
Basic Rules
These are basic Access Control rules we recommend for all Rule Bases:
Stealth rule that prevents direct access to the Security Gateway
Cleanup rule that drops all traffic that is not allowed by the earlier rules in the policy
Note - There is also the implicit drop rule that drops all traffic that did not match all
other rules. This rule does not create log entries. If you want to log the traffic, create an
explicit cleanup rule.
4 DNS server Any DNS Domain UDP Accept None Policy Targets
5 Mail and Web Any DMZ HTTP Accept Log Policy Targets
servers HTTPS
SMTP
6 SMTP Mail NOT Internal SMTP Accept Log Policy Targets
net group
7 DMZ & Internet IntGroup Any Any Accept Log Policy Targets
1. Stealth - All traffic that is NOT from the internal company network to one of the Security
Gateways is dropped. When a connection matches the Stealth rule, an alert window opens in
SmartView Monitor.
2. Critical subnet - Traffic from the internal network to the specified resources is logged. This
rule defines three subnets as critical resources: Finance, HR, and R&D.
3. Tech support - Allows the Technical Support server to access the Remote-1 web server which
is behind the Remote-1 Security Gateway. Only HTTP traffic is allowed. When a packet
matches the Tech support rule, the Alert action is done.
4. DNS server - Allows UDP traffic to the external DNS server. This traffic is not logged.
5. Mail and Web servers - Allows incoming traffic to the mail and web servers that are located in
the DMZ. HTTP, HTTPS, and SMTP traffic is allowed.
6. SMTP - Allows outgoing SMTP connections to the mail server. Does not allow SMTP
connections to the internal network, to protect against a compromised mail server.
7. DMZ and Internet - Allows traffic from the internal network to the DMZ and Internet.
8. Clean up rule - Drops all traffic. All traffic that is allowed matched one of the earlier rules.
Preventing IP Spoofing
IP spoofing replaces the untrusted source IP address with a fake, trusted one, to hijack
connections to your network. Attackers use IP spoofing to send malware and bots to your
protected network, to execute DoS attacks, or to gain unauthorized access.
Anti-Spoofing detects if a packet with an IP address that is behind a certain interface, arrives from
a different interface. For example, if a packet from an external network has an internal IP
address, Anti-Spoofing blocks that packet.
Example:
The diagram shows a Gateway with interfaces A and B, and C, and some example networks behind
the interfaces.
Configuring Anti-Spoofing
Make sure to configure Anti-Spoofing protection on all the interfaces of the Security Gateway,
including internal interfaces.
Loss of productivity - Employees can spend time on social networking and other applications
that can decrease business productivity.
Content control - Prevent Internet access to websites with inappropriate content, such as sex
and violence.
UserCheck
UserCheck works with the URL Filtering and Application Control Software Blades and lets the
Security Gateways send messages to users about possible non-compliant or dangerous Internet
browsing. Create UserCheck objects and use them in the Application Control and URL Filtering
rules, to communicate with the users. These actions use UserCheck objects:
Inform
Ask
Drop
UserCheck on a computer
The UserCheck client is installed on endpoint computers. This client:
Sends messages for applications that are not based on Internet browsers, such as Skype and
iTunes, and Internet browser add-ons and plug-ins.
Shows a message on the computer when it cannot be shown in the Internet browser.
Action
In the Action field, define what occurs to traffic that matches the URL Filtering and Application
Control rule. These are the Action options:
Action Description
Accept Allows the traffic.
Limit Limits the bandwidth that is permitted for a rule. Add a Limit object to configure
a maximum throughput for uploads and downloads.
Enable Identity Redirects HTTP traffic to an authentication (captive) portal. After the user is
Captive Portal authenticated, new connections from this source are inspected without
requiring authentication.
UserCheck Actions
These are the Action options that work with UserCheck:
Action Description
Drop Blocks the traffic.
Optionally, shows a UserCheck Block message.
Ask Shows a UserCheck Ask message. The message asks users to confirm that it is
necessary that they go to the application or site.
UserCheck Defines how often users see the UserCheck message for Ask, Inform, or Block
Frequency actions.
2 High risk Any Internet High Risk High Risk Block Log Any
applications iTunes Message
These options are configured in the Access Control Policy Rule Base and also changes how Hit
Count is shown in other supported Software Blades.
When you enable Hit Count, the Security Management Server collects the data from supported
Security Gateways (from version R75.40 and up). Hit Count works independently from logging and
tracks the hits even if the Track option is None.
You can use the Hit Count data to:
Analyze a Rule Base - You can delete rules that have no matching connections
Note - If you see a rule with a zero hit count it only means that in the Security Gateways
enabled with Hit Count there were no matching connections. There can be matching
connections on other Security Gateways.
Improve Firewall performance - You can move a rule that has a high hit count to a higher
position in the Rule Base
Better understand the behavior of the Access Control Policy
Inspection Settings
You can configure inspection settings for the Firewall:
Deep packet inspection settings
Protocol parsing inspection settings
VoIP packet inspection settings
Security Management Server comes with two preconfigured inspection profiles:
Default Inspections
Recommended Inspections
When a Security Gateway is configured, the Default Inspections profile is enabled for it. You can
also assign the Recommended Inspections profile the Security Gateway, or to create a custom
profile and assign it to the Security Gateway.
To activate the Inspection Settings, install the Access Control Policy.
Note - In pre-R80 SmartConsole, Inspection Settings are configured as IPS Protections.
7. Click Close.
IPS
Overview of IPS
The Check Point IPS Software Blade analyzes traffic for possible risks, to enhance the network
security of your organization. The IPS detection engine has multiple defense layers, detects and
prevents against known threats, and often protects against future ones.
For example IPS protects against drive-by downloads, where a user can go to a legitimate web site
and unknowingly download malware. The malware can exploit a browser vulnerability that lets it
create a special HTTP response that sends the malware to the client. The firewall allows the HTTP
traffic from the web site and the computer is at risk for this malware. IPS protects the computer,
because it identifies and then blocks the drive-by download connection.
protections are enforced by gateways, and the deactivated protections are not enforced,
regardless of the general profile protection settings.
Column Description
Protection Name of the protection.
Performance Impact How this protection affects the performance of a Security Gateway.
profile_name The Activation setting for the protection for each IPS profile.
4. From the navigation tree, select IPS > Pre R80 Settings.
5. In the Excluded Protections Categories section, make sure that Do not activate protections of
the following categories is selected.
6. Click the plus sign and select a protection category.
7. Repeat the previous step for each protection category.
8. Click OK.
9. Install the Access Control policy.
Anti-Bot
Protecting Networks from Bots
A bot is malicious software that can infect your computer. It is possible to infect a computer when
you open attachments that exploit a vulnerability, or go to a web site that results in a malicious
download.
When a bot infects a computer, it:
Takes control of the computer and neutralizes its Anti-Virus defenses. It is not easy to find bots
on your computer, they hide and change how they look to Anti-Virus software.
Connects to a C&C (Command and Control center) for instructions from cyber criminals. The
cyber criminals, or bot herders, can remotely control it and instruct it to do illegal activities
without your knowledge. Your computer can do one or more of these activities:
Steal data (personal, financial, intellectual property, organizational)
Send spam
Attack resources (Denial of Service Attacks)
Consume network bandwidth and reduce productivity
One bot can often create multiple threats. Bots are frequently used as part of Advanced
Persistent Threats (APTs) where cyber criminals try to damage individuals or organizations.
The Anti-Bot Software Blade detects and prevents these bot and botnet threats. A botnet is a
collection of compromised and infected computers.
Anti-Virus
Protecting Networks from Viruses
The Anti-Virus Software Blade inspects connections to the Internet and scans file transfers and
downloads to the internal network to find and prevent malware attacks. It also gives pre-infection
protection from external malware and malicious servers.
Column Description
Protection Name of the protection type.
When you select a protection in the table, the summary and the activation information are shown
in the bottom part of the screen. The Summary tab is shown by default. To see the activation
information, click the Activations tab.
The table in the Activations tab view shows information in the table with these fields:
Column Description
Profile The profile name.
Action The action that is configured in the profile for the selected protection:
Ask - Asks user to select an action
Prevent - Blocks traffic that matches the protection
Detect - Allows all traffic and logs traffic that matches the protection
Inactive - Disables the protection
Protections can have more than one action. The Action column shows the
percentage of protections set to each action.
Field Description
No. Rule number in the Rule Base. An exception rule contains the letter E and a
digit that represents the exception number. For example, E-2.2 is the second
exception for the second rule.
Protected Objects that are protected against bots and viruses. Traffic to and from these
Scope objects is inspected even if the objects did not open the connection.
Field Description
Protection For rules, the value for this field is always N/A. The protections are set
according the profile in the Action field.
For exceptions, set this field to one or more specified protections.
Action For rules, the value for this field is an Anti-Bot and Anti-Virus profile.
For exceptions, set this field to Prevent or Detect.
Track Tracking and logging action that is done when traffic matches the rule.
Install On Network objects that get this rule. The default setting is All and installs the
policy on all Security Gateways that have Anti-Bot and Anti-Virus enabled.
Rule number 1, High Security - Traffic for the Finance server and two corporate networks are
inspected for bots and viruses according to the settings in the High_Security profile. The traffic is
logged and the packets are captured for analysis in the Logs & Monitor > Logs view.
Rule number 2, Malware Rule - All traffic in the network is inspected for bots and viruses
according to the settings in the Optimized profile.
Exception 2.1 to rule 2, R&D Server - A global exception rule for the Server_1 object, that only
detects the Backdoor.Win32.Shark.A protection.
Exception 2.2 to rule 2, Users_3 - An exception rule for the Users_3 Access Role, that sets some
protections to Detect instead of Prevent.
Threat Emulation
The Need for Threat Emulation
Cyber-threats continue to multiply and now it is easier than ever for criminals to create new
malware that can easily bypass existing protections. On a daily basis, these criminals can change
the malware signature and make it virtually impossible for signature based products to protect
networks against infection. Threat Emulation can protect your network against new malware,
ThreatCloud Emulation
You can securely send files to the Check Point ThreatCloud for emulation. The ThreatCloud is
always up-to-date with the latest Threat Emulation releases.
Item Description
1 Internet and external networks
Note - For ThreatCloud emulation, it is necessary that the Security Gateway can connect
to the Internet. We recommend that you make sure that the DNS and proxy settings are
configured correctly in Global Properties.
Do not have a critical effect on Performance impact Activate protections that have a Medium
performance or lower effect on performance.
Newly downloaded IPS protections are set to Detect. They are activated according to the IPS
Newly Updated Protections.
Add this rule above the Out-of-the-box Threat Prevention policy to monitor bot activity
("Monitoring Bot Activity" on page 89):
Blocking bots
Scenario: I want to block bots in my organization. How can I do this?
You can block bots ("Blocking Bots" on page 88) using the out-of-the-box Threat Prevention policy
rule, with the Optimized profile:
Editing Profiles
You can change the settings of the IPS and Threat Prevention profile according to your
requirements.
To edit a profile:
1. In SmartConsole, select Security Policies > Threat Prevention.
2. From the Threat Tools section, click Profiles.
The Profiles page opens.
3. Right-click the profile and select Edit.
Creating Rules
The Threat Prevention policy determines how the system inspects connections for bots and
viruses. The primary component of the policy is the Rule Base. The rules use the Malware
database and network objects.
If you enable Identity Awareness on your gateways, you can also use Access Role objects as the
scope in a rule. This lets you easily make rules for individuals or different groups of users.
There are no implied rules in the Rule Base. All traffic is allowed unless it is explicitly blocked.
Predefined Rule
When you enable the IPS or one of the Threat Prevention Software Blades, a predefined rule is
added to the Rule Base. The rule defines that all traffic for all network objects, regardless of who
opened the connection, (the protected scope value equals any) is inspected for all protections
according to the recommended profile. By default, logs are generated and the rule is installed on
all Security Gateways that use a Threat Prevention Software Blade.
Note - You cannot edit the settings of the predefined rule for the IPS Security Gateway.
The result of this rule (according to the Optimized profile) is that:
All protections that can identify an attack with a high or medium confidence level and have a
medium or lower performance impact are set to Prevent mode.
All protections that can identify an attack with a low confidence level and have a medium or
lower performance impact are set to Detect mode.
Use the Logs & Monitor page to show logs related to IPS and Threat Prevention traffic. Use the
data there to better understand the use of these Software Blades in your environment and create
an effective Rule Base. You can also directly update the Rule Base from this page.
You can add more exceptions that prevent or detect specified protections or have different
tracking settings.
Creating Rules
Here are examples of how to create different types of Anti-Bot rules.
Blocking Bots
Scenario: I want to block bots in my organization. How can I do this?
In this example you will install this default Threat Policy rule that uses the recommended policy,
or create a new rule.
Blocking Viruses
Scenario: I want to block viruses and malware in my organization. How can I do this?
You can update the IPS, Anti-Bot, Anti-Virus and Threat Emulation Rule Base to give immediate
coverage for new malware threats.
The Malware database only updates if you have a valid Anti-Bot, Threat Emulation and/or
Anti-Virus contract.
By default, updates for Anti-Virus and Anti-Bot run on the Security Gateway every two hours. For
IPS and Threat Emulation you must configure an update schedule. You can change the update
schedule or choose to manually update the Security Gateway. The updates are stored in a few files
on each Security Gateway.
Scheduling Updates
You can change the default automatic schedule for when updates are automatically downloaded
and installed. If you have Security Gateways in different time zones, they are not synchronized
when one updates and the other did not yet update.
Anti-Spam
Employees waste more and more time to sort through bulk emails commonly known as spam. The
amount of resources (disk space, network bandwidth, CPU) devoted to handling spam also
increases from year to year. In addition, unwanted emails continue to grow and can be an
unexpected security threat to networks. Cyber-criminals can use emails to let viruses and
malware into your network. The Anti-Spam and Mail Software Blade gives system administrators
an easy and central tool to eliminate most of the spam that reaches their networks.
Enabling Anti-Spam
Use the Overview page in the Anti-Spam & Mail tab of the SmartDashboard to enable Anti-Spam
on a Security Gateway.
To enable Anti-Spam:
1. In SmartConsole, go to Manage & Settings > Blades.
2. In the Anti-Spam & Mail section, click Configure in SmartDashboard.
SmartDashboard opens and shows the Overview page in the Anti-Spam & Mail tab.
3. Click Anti-Spam.
The Anti-Spam Enforcing Gateways window opens.
4. Select one or more Security Gateways.
5. Click OK.
Sample Configuration
Feature Setting Description
Content based Anti-Spam High protection Identifies spam based on email content
Mail Anti-Virus Block Scans and filters emails for viruses and
other malware
Zero hour malware protection Off Does not scan the Internet to identify and
filter new virus email attacks
The Zero hour malware protection feature is set to Off because enabling the feature has a
negative effect on network performance.
RADIUS
Remote Authentication Dial-In User Service (RADIUS) is an external authentication method that
provides security and scalability by separating the authentication function from the access server.
Using RADIUS, the Security Gateway forwards authentication requests by remote users to the
RADIUS server. For administrators, the Security Management Server forwards the authentication
requests. The RADIUS server, which stores user account information, does the authentication.
The RADIUS protocol uses UDP to communicate with the gateway or the Security Management
Server.
RADIUS servers and RADIUS server group objects are defined in SmartConsole.
SecurID
SecurID requires users to both possess a token authenticator and to supply a PIN or password.
Token authenticators generate one-time passwords that are synchronized to an RSA ACE/server
and may come in the form of hardware or software. Hardware tokens are key-ring or credit
card-sized devices, while software tokens reside on the PC or device from which the user wants to
authenticate. All tokens generate a random, one-time use access code that changes
approximately every minute. When a user attempts to authenticate to a protected resource, the
one-time use code must be validated by the ACE/server.
Using SecurID, the Security Gateway forwards authentication requests by remote users to the
ACE/server. For administrators, it is the Security Management Server that forwards the requests.
ACE manages the database of RSA users and their assigned hard or soft tokens. The gateway or
the Security Management Server act as an ACE/Agent 5.0 and direct all access requests to the
RSA ACE/server for authentication. For additional information on agent configuration, refer to
ACE/server documentation.
There are no specific parameters required for the SecurID authentication method.
TACACS
Terminal Access Controller Access Control System (TACACS) provides access control for routers,
network access servers and other networked devices through one or more centralized servers.
TACACS is an external authentication method that provides verification services. Using TACACS,
the Security Gateway forwards authentication requests by remote users to the TACACS server. For
administrators, it is the Security Management Server that forwards the requests. The TACACS
server, which stores user account information, authenticates users. The system supports physical
card key devices or token cards and Kerberos secret key authentication. TACACS encrypts the
user name, password, authentication services and accounting information of all authentication
requests to ensure secure communication.
To use RADIUS groups, you must define a return attribute in the RADIUS user profile of the
RADIUS server. This attribute is returned to the Security Gateway and contains the group name
(for example, RAD_<group to which the RADIUS users belong>) to which the users belong.
Use these RADIUS attributes (refer to RFC 2865):
For SecurePlatform - attribute "Class" (25)
For other operating systems, including Gaia, Windows, and IPSO- attribute "Vendor-Specific"
(26)
4. Click OK.
User Database
Users defined in SmartConsole are saved to the User Database on the Security Management
Server, together with the user authentication schemes and encryption keys. Then, the user
database is installed on Security Gateways and Check Point hosts:
On Security Gateways - When the policy is installed (Install Policy)
On Check Point hosts with an active Management blade (such as Log Server) - When the
database is installed (Install Database)
The user database does not contain information about users defined elsewhere than on the
Security Management Server (such as users in external User Directory groups), but it does contain
information about the external groups themselves (for example, on which Account Unit the
external group is defined). Changes to external groups take effect only after the policy is installed,
or the user database is downloaded from the management server.
Managing Certificates
Generate and register SIC certificates for user accounts. This authenticates the user in the Check
Point system. Use certificates with required authentication for added access control.
Configuring Encryption
If the user will access resources from a remote location, traffic between the remote user and
internal resources will be encrypted. Configure encryption settings for remote access users.
To configure encryption:
1. Open the User Properties window > Encryption page.
2. Select an encryption method for the user.
3. Click Edit.
The encryption Properties window opens.
The next steps are for IKE Phase 2. The options can be different for different methods.
4. Open the Authentication tab.
5. Select the authentication schemes:
a) Password - The user authenticates with a pre-shared secret password. Enter and confirm
the password.
b) Public Key - The user authenticates with a public key contained in a certificate file.
6. Click OK.
7. Click OK.
Delete a User
To delete a user:
1. In the object tree, click Users > Users.
2. Right-click the account and select Delete.
The confirmation window opens.
3. Click Yes.
Determine the order of priority ("Setting High Availability Priority" on page 133) among the
User Directory servers for High Availability and querying purposes.
Assign users ("Managing Users on a User Directory Server" on page 134) to different Account
Units, branches, and sub-branches, so that users with common attributes (such as their role in
the organization, permissions, etc.) are grouped together.
In This Section
Schema Checking .......................................................................................................105
OID Proprietary Attributes .........................................................................................105
User Directory Schema Attributes.............................................................................106
Netscape LDAP Schema ............................................................................................112
Schema Checking
When schema checking is enabled, User Directory requires that every Check Point object class
and its associated attributes be defined in the directory schema.
Before you work with User Directory, make sure that schema checking is disabled. Otherwise the
integration will fail. After the Check Point object classes and attributes are applied to the User
Directory server's schema, you must enable schema checking again.
fw1person 1.3.114.7.4.2.0.2
The OIDs for the proprietary attributes begin with the same prefix ("1.3.114.7.4.2.0.X"). Only the
value of "X" is different for each attribute. See Attributes (see "User Directory Schema Attributes"
on page 106) for the value of "X".
cn
The entry's name. This is also referred to as "Common Name". For users this can be different
from the uid attribute, the name used to login to the Security Gateway. This attribute is also used
to build the User Directory entry's distinguished name, that is, it is the RDN of the DN.
Check Point Security Management Administration Guide R80 | 106
Managing User Accounts
uid
The user's login name, that is, the name used to login to the Security Gateway. This attribute is
passed to the external authentication system in all authentication methods except for "Internal
Password", and must be defined for all these authentication methods.
The login name is used by the Security Management Server to search the User Directory server(s).
For this reason, each user entry should have its own unique uid value.
It is also possible to login to the Security Gateway using the full DN. The DN can be used when
there is an ambiguity with this attribute or in "Internal Password" when this attribute may be
missing. The DN can also be used when the same user (with the same uid) is defined in more than
one Account Unit on different User Directory servers.
description
Descriptive text about the user.
default
"no value"
mail
User's email address.
default
"no value"
member
An entry can have zero or more values for this attribute.
In a template: The DN of user entries using this template. DNs that are not users (object
classes that are not one of: "person", "organizationalPerson", "inetOrgPerson" or
"fw1person") are ignored.
In a group: The DN of user.
userPassword
Must be given if the authentication method (fw1auth-method) is "Internal Password". The value
can be hashed using "crypt". In this case the syntax of this attribute is:
"{crypt}xxyyyyyyyyyyy"
where "xx" is the "salt" and "yyyyyyyyyyy" is the hashed password.
It is possible (but not recommended) to store the password without hashing. However, if hashing
is specified in the User Directory server, you should not specify hashing here, in order to prevent
the password from being hashed twice. You should also use SSL in this case, to prevent sending
an unencrypted password.
The Security Gateway never reads this attribute, though it does write it. Instead, the User Directory
bind operation is used to verify a password.
fw1authmethod
One of the following:
RADIUS, TACACS, SecurID, OS Password, Defender
This default value for this attribute is overridden by Default Scheme in the Authentication tab of
the Account Unit window in SmartDashboard. For example: a User Directory server can contain
User Directory entries that are all of the object-class "person" even though the proprietary
object-class "fw1person" was not added to the server's schema. If Default Scheme in
SmartConsole is "Internal Password", all the users will be authenticated using the password
stored in the "userPassword" attribute.
fw1authserver
"X" in OID fw1person fw1template default
1 y y "undefined"
The name of the server that will perform the authentication. This field must be given if
fw1auth-method is "RADIUS" or "TACACS". For all other values of fw1auth-method, it is ignored.
Its meaning is given below:
method meaning
RADIUS name of a RADIUS server, a group of RADIUS servers, or "Any"
fw1pwdLastMod
The date on which the password was last modified. The format is yyyymmdd (for example, 20
August 1998 is 19980820). A password can be modified through the Security Gateway as a part of
the authentication process.
fw1expiration-date
The last date on which the user can login to a Security Gateway, or "no value" if there is no
expiration date. The format is yyyymmdd (for example, 20 August 1998 is 19980820). The default is
"no value".
fw1hour-range-from
The time from which the user can login to a Security Gateway. The format is hh:mm (for example,
8:15 AM is 08:15).
fw1hour-range-to
The time until which the user can login to a Security Gateway. The format is hh:mm (for example,
8:15 AM is 08:15).
fw1day
The days on which the user can login to a Security Gateway. Can have the values "SUN","MON",
and so on.
fw1allowed-src
The names of one or more network objects from which the user can run a client, or "Any" to
remove this limitation, or "no value" if there is no such client. The names should match the name
of network objects defined in Security Management server.
fw1allowed-dst
The names of one or more network objects which the user can access, or "Any" to remove this
limitation, or "no value" if there is no such network object. The names should match the name of
network objects defined on the Security Management server.
fw1allowed-vlan
Not currently used.
fw1SR-keym
The algorithm used to encrypt the session key in SecuRemote. Can be "CLEAR", "FWZ1", "DES" or
"Any".
fw1SR-datam
The algorithm used to encrypt the data in SecuRemote. Can be "CLEAR", "FWZ1", "DES" or "Any".
fw1SR-mdm
The algorithm used to sign the data in SecuRemote. Can be "none" or "MD5".
fw1enc-fwz-expiration
The number of minutes after which a SecuRemote user must re-authenticate himself or herself to
the Security Gateway.
fw1sr-auth-track
The exception to generate on successful authentication via SecuRemote. Can be "none", "cryptlog"
or "cryptalert".
fw1groupTemplate
This flag is used to resolve a problem related to group membership.
The group membership of a user is stored in the group entries to which it belongs, in the user
entry itself, or in both entries. Therefore there is no clear indication in the user entry if information
from the template about group relationship should be used.
If this flag is "TRUE", then the user is taken to be a member of all the groups to which the
template is a member. This is in addition to all the groups in which the user is directly a member.
fw1ISAKMP-EncMethod
The key encryption methods for SecuRemote users using IKE. This can be one or more of: "DES",
"3DES". A user using IKE (formerly known as ISAMP) may have both methods defined.
fw1ISAKMP-AuthMethods
The allowed authentication methods for SecuRemote users using IKE, (formerly known as ISAMP).
This can be one or more of: "preshared", "signatures".
fw1ISAKMP-HashMethods
The data integrity method for SecuRemote users using IKE, (formerly known as ISAMP). This can
be one or more of: "MD5", "SHA1". A user using IKE must have both methods defined.
fw1ISAKMP-Transform
The IPSec Transform method for SecuRemote users using IKE, (formerly known as ISAMP). This
can be one of: "AH", "ESP".
fw1ISAKMP-DataIntegrityMethod
The data integrity method for SecuRemote users using IKE, (formerly known as ISAMP). This can
be one of: "MD5", "SHA1".
fw1ISAKMP-SharedSecret
The pre-shared secret for SecuRemote users using IKE, (formerly known as ISAMP).
The value can be calculated using the fw ikecrypt command line.
fw1ISAKMP-DataEncMethod
The data encryption method for SecuRemote users using IKE, (formerly known as ISAMP).
fw1enc-Methods
The encryption method allowed for SecuRemote users. This can be one or more of: "FWZ",
"ISAKMP" (meaning IKE).
fw1userPwdPolicy
Defines when and by whom the password should and can be changed.
fw1badPwdCount
Number of allowed wrong passwords entered sequentially.
fw1lastLoginFailure
Time of the last login failure.
memberof template
DN of the template that the user is a member of.
Important - This deletes the objectclass definition from the schema and adds the
updated one in its place.
We recommend that you back up the User Directory server before you run the command.
The ldif file:
Adds the new attributes to the schema
Deletes old definitions of fw1person and fw1template
Adds new definitions of fw1person and fw1template
To change the Netscape LDAP schema, run the ldapmodify command with the schema.ldif file.
On some server versions, the delete objectclass operation can return an error, even if it was
successful. Use ldapmodify with the -c (continuous) option.
LDAP servers have difference object repositories, schemas, and object relations.
The organization's user database may have unconventional object types and relations because
of a specific application.
Some applications use the cn attribute in the User object's Relatively Distinguished Name
(RDN) while others use uid.
In Microsoft Active Directory, the user attribute memberOf describes which group the user
belongs to, while standard LDAP methods define the member attribute in the group object
itself.
Different servers implement different storage formats for passwords.
Some servers are considered v3 but do not implement all v3 specifications. These servers
cannot extend the schema.
Some LDAP servers already have built in support for certain user data, while others require a
Check Point schema extended attribute. For example, Microsoft Active Directory has the
accountExpires user attribute, but other servers require the Check Point attribute
fw1expirationdate, which is part of the Check Point defined fw1person objectclass.
Some servers allow queries with non-defined types, while others do not.
To apply a profile:
1. Open the Account Unit.
2. Select the profile.
To change a profile:
1. Create a new profile.
2. Copy the settings of a User Directory profile into the new profile.
3. Change the values.
Profile Attributes
Attributes:
UserLoginAttr .............................................................................................................116
UserPasswordAttr ......................................................................................................116
TemplateObjectClass .................................................................................................116
ExpirationDateAttr ......................................................................................................116
ExpirationDateFormat ................................................................................................116
PsswdDateFormat ......................................................................................................116
PsswdDateAttr ............................................................................................................117
BadPwdCountAttr .......................................................................................................117
ClientSideCrypt ...........................................................................................................117
DefaultCryptAlgorith ..................................................................................................117
CryptedPasswordPrefix..............................................................................................117
PhoneNumberAttr ......................................................................................................118
AttributesTranslationMap ..........................................................................................118
ListOfAttrsToAvoid ......................................................................................................118
BranchObjectClass .....................................................................................................118
BranchOCOperator .....................................................................................................119
OrganizationObjectClass ............................................................................................119
OrgUnitObjectClass ....................................................................................................119
DomainObjectClass ....................................................................................................119
UserObjectClass .........................................................................................................119
UserOCOperator .........................................................................................................120
GroupObjectClass .......................................................................................................120
GroupOCOperator .......................................................................................................120
UserMembershipAttr..................................................................................................120
TemplateMembership ................................................................................................121
TemplateMembershipAttr ..........................................................................................121
UserTemplateMembershipAttr ..................................................................................121
OrganizationRDN ........................................................................................................121
OrgUnitRDN ................................................................................................................121
UserRDN .....................................................................................................................122
GroupRDN ...................................................................................................................122
DomainRDN ................................................................................................................122
AutomaticAttrs ............................................................................................................122
GroupObjectClass .......................................................................................................122
OrgUnitObjectClass ....................................................................................................123
OrganizationObjectClass ............................................................................................123
UserObjectClass .........................................................................................................123
DomainObjectClass ....................................................................................................123
UserLoginAttr
The unique username User Directory attribute (uid). In addition, when fetching users by the
username, this attribute is used for query.
default Other
uid (most servers) One value allowed
SamAccountName (in Microsoft_AD)
UserPasswordAttr
This user password User Directory attribute.
default Other
userPassword (most servers) One value allowed
unicodePwd (in Microsoft_AD)
TemplateObjectClass
The object class for Check Point User Directory templates. If you change the default value with
another objectclass, make sure to extend that objectclass schema definition with relevant
attributes from fw1template.
default Other
fw1template Multiple values allowed
ExpirationDateAttr
The account expiration date User Directory attribute. This could be a Check Point extended
attribute or an existing attribute.
default Other
fw1expiration-date (most servers) One value allowed
accountExpires (in Microsoft_AD)
ExpirationDateFormat
Expiration date format. This format will be applied to the value defined at ExpirationDateAttr.
default Other
CP format is yyyymmdd One value allowed
PsswdDateFormat
The format of the password modified date User Directory attribute. This formation will be applied
to the value defined at PsswdDateAttr.
default Other
CP (most servers) format is yyyymmdd One value allowed
MS (in Microsoft_AD)
PsswdDateAttr
The password last modified date User Directory attribute.
default Other
fw1pwdLastMod (most servers) One value allowed
pwdLastSet (in Microsoft_AD)
BadPwdCountAttr
User Directory attribute to store and read bad password authentication count.
default Other
fw1BadPwdCount One value allowed
ClientSideCrypt
If 0, the sent password will not be encrypted. If 1, the sent password will be encrypted with the
algorithm specified in the DefaultCryptAlgorithm.
default Other
0 for most servers One value allowed
1 for Netscape_DS
if not using encrypted password, SSL is recommended
DefaultCryptAlgorith
The algorithm used to encrypt a password before updating the User Directory server with a new
password.
default Other
Plain (for most servers) One value allowed
Crypt (for Netscape_DS)
SHAI1
CryptedPasswordPrefix
The text to prefix to the encrypted password when updating the User Directory server with a
modified password.
default Other
{Crypt} (for Netscape_DS) One value allowed
PhoneNumberAttr
User Directory attribute to store and read the user phone number.
default Other
internationalisednumber One value allowed
AttributesTranslationMap
General purpose attribute translation map, to resolve problems related to peculiarities of different
server types. For example, an X.500 server does not allow the "-" character in an attribute name.
To enable the Check Point attributes containing "-", specify a translation entry: (e.g.,
"fw1-expiration =fw1expiration").
default Other
none Multiple values allowed
ListOfAttrsToAvoid
All attribute names listed here will be removed from the default list of attributes included in
read/write operations. This is most useful in cases where these attributes are not supported by
the User Directory server schema, which might fail the entire operation. This is especially relevant
when the User Directory server schema is not extended with the Check Point schema extension.
Default Other
There are no values by default. In case the User Multiple values allowed
Directory server was not extended by the Check
Point schema, the best thing to do is to list here all
the new Check Point schema attributes.
BranchObjectClass
Use this attribute to define which type of objects (objectclass) is queried when the object tree
branches are displayed after the Account Unit is opened in SmartDashboard.
Default Other
Organization OrganizationalUnit Domain (most Multiple values allowed
servers)
Container (extra for Microsoft_AD)
BranchOCOperator
If One is set, an ORed query will be sent and every object that matches the criteria will be
displayed as a branch. If All, an ANDed query will be sent and only objects of all types will be
displayed.
Default Other
One One value allowed
OrganizationObjectClass
This attribute defines what objects should be displayed with an organization object icon. A new
object type specified here should also be in BranchObjectClass.
Default Other
organization Multiple values allowed
OrgUnitObjectClass
This attribute defines what objects should be displayed with an organization object icon. A new
object type specified here should also be in BranchObjectClass.
Default Other
organizationalUnit (most servers) Multiple values allowed
Contained (added to Microsoft_AD)
DomainObjectClass
This attribute defines what objects should be displayed with a Domain object icon. A new object
type specified here should also be in BranchObjectClass.
Default Other
Domain Multiple values allowed
UserObjectClass
This attribute defines what objects should be read as user objects. The user icon will be displayed
on the tree for object types specified here.
Default Other
User (in Microsoft_AD) Multiple values allowed
Person
OrganizationalPerson
InertOrgPerson
FW1 Person (most servers)
UserOCOperator
If 'one' is set, an ORed query will be sent and every object that matches one of the types will be
displayed as a user. If 'all' and ANDed query will be sent and only objects of all types will be
displayed.
Default Other
One One value allowed
GroupObjectClass
This attribute defines what objects should be read as groups. The group icon will be displayed on
the tree for objects of types specified here.
Default Other
Groupofnames Multiple values allowed
Groupofuniquenames (most servers)
Group
Groupofnames (in Microsoft_AD)
GroupOCOperator
If 'one' is set an ORed query will be sent and every object that matches one of the types will be
displayed as a user. If 'all' an ANDed query will be sent and only objects of all types will be
displayed.
GroupMembership
Default Other
One One value allowed
Defines the relationship Mode between the group and its members (user or template objects)
when reading group membership.
Default Other
Member mode defines the member DN in the Group object (most servers) One value
allowed
MemberOf mode defines the group DN in the member object (in
Microsoft_AD)
Modes define member DN in Group object and group DN in Member object.
UserMembershipAttr
Defines what User Directory attribute to use when reading group membership from the user or
template object if GroupMembership mode is 'MemberOf' or 'Both' you may be required to extend
the user/template object schema in order to use this attribute.
Default Other
MemberOf One value allowed
TemplateMembership
Defines the user to template membership mode when reading user template membership
information.
Default Other
Member mode defines the member DN in the Group object (most One value allowed
servers)
MemberOf mode defines the group DN in the member object (in
Microsoft_AD)
TemplateMembershipAttr
Defines which attribute to use when reading the User members from the template object, as User
DNs, if the TemplateMembership mode is Member.
Default Other
member Multiple values allowed
UserTemplateMembershipAttr
Defines which attribute to use when reading from the User object the template DN associated with
the user, if the TemplateMembership mode is MemberOf.
Default Other
member Multiple values allowed
OrganizationRDN
This value will be used as the attribute name in the Relatively Distinguished Name (RDN) when
creating a new organization via SmartDashboard.
Default Other
o One value allowed
OrgUnitRDN
This value will be used as the attribute name in the Relatively Distinguished Name (RDN) when
creating a new organizationalUnit via SmartDashboard.
Default Other
ou One value allowed
Check Point Security Management Administration Guide R80 | 121
Managing User Accounts
UserRDN
This value will be used as the attribute name in the Relatively Distinguished Name (RDN) when
creating a new User object via SmartDashboard.
Default Other
cn One value allowed
GroupRDN
This value will be used as the attribute name for the RDN when creating a new Group object via
SmartDashboard.
Default Other
cn One value allowed
DomainRDN
This value will be used as the attribute name for the RDN when creating a new Domain object via
SmartDashboard.
Default Other
dc One value allowed
AutomaticAttrs
This field is relevant when creating objects in SmartDashboard. The format of this field is
Objectclass:name:value meaning that if the object being created is of type ObjectClass
then additional attributes will be included in the created object with name 'name' and value
'value'.
Default Other
user:userAccountControl:66048 Multiple values
allowed
For Microsoft_AD This means that when a user object is created an extra
attribute is included automatically: userAccountControl with the value
66048
GroupObjectClass
This field is used when modifying an existing group in SmartDashboard. The format of this field is
ObjectClass:memberattr meaning that for each group objectclass there is a group membership
attribute mapping. List here all the possible mappings for this User Directory server profile. When
a group is modified, based on the group's objectclass the right group membership mapping will be
used.
Default Other
groupOfNames:member Multiple values allowed
groupOfUniqueNames:uniqueMember
(All other servers)
OrgUnitObjectClass
This determines which ObjectClass to use when creating/modifying an OrganizationalUnit object.
These values can be different from the read counterpart.
Default Other
OrganizationalUnit Multiple values allowed
OrganizationObjectClass
This determines which ObjectClass to use when creating and/or modifying an Organization object.
These values can be different from the read counterpart.
Default Other
Organization Multiple values allowed
UserObjectClass
This determines which ObjectClass to use when creating and/or modifying a user object. These
values can be different from the read counterpart.
Default Other
User (in Microsoft_AD) Multiple values allowed
person
organizationalPerson
inetOrgPerson
fw1Person
(All other servers)
DomainObjectClass
Determines which ObjectClass to use when creating and/or modifying a domain context object.
These values can be different from the read counterpart.
Default Other
Domain Multiple values allowed
Most of the user objects and group objects created by Windows 2000 tools are stored under the
CN=Users, DCROOT branch, others under CN=Builtin, DCROOT branch, but these objects can
be created under other branches as well.
The branch CN=Schema, CN=Configuration, DCROOT contains all schema definitions.
Check Point can take advantage of an existing Active Directory object as well as add new types.
For users, the existing user can be used "as is" or be extended with fw1person as an auxiliary of
"User" for full feature granularity. The existing Active Directory "Group" type is supported "as is".
A User Directory template can be created by adding the fw1template objectclass. This information
is downloaded to the directory using the schema_microsoft_ad.ldif file (see Adding New
Attributes to the Active Directory (on page 126)).
Performance
The number of queries performed on the directory server is significantly low with Active Directory.
This is achieved by having a different object relations model. The Active Directory group-related
information is stored inside the user object. Therefore, when fetching the user object no additional
query is necessary to assign the user with the group. The same is true for users and templates.
Manageability
SmartConsole allows the creation and management of existing and new objects. However, some
specific Active Directory fields are not enabled via SmartConsole.
Enforcement
It is possible to work with the existing Active Directory objects without extending the schema. This
is made possible by defining an Internal Template object and assigning it with the User Directory
Account Unit defined on the Active Directory server.
For example, if you wish to enable all users with IKE+Hybrid based on the Active Directory
passwords, create a new template with the IKE properties enabled and "Check Point password" as
the authentication method.
Delegating Control
Delegating control over the directory to a specific user or group is important since by default the
Administrator is not allowed to modify the schema or even manage directory objects through User
Directory protocol.
dn:CN=fw1auth-method,CN=Schema,CN=Configuration,DCROOT
changetype: add
adminDisplayName: fw1auth-method
attributeID: 1.3.114.7.4.2.0.1
attributeSyntax: 2.5.5.4
cn: fw1auth-method
distinguishedName:
CN=fw1auth-method,CN=Schema,CN=Configuration,DCROOT
instanceType: 4
isSingleValued: FALSE
LDAPDisplayName: fw1auth-method
name: fw1auth-method
objectCategory:
CN=Attribute-Schema,CN=ConfigurationCN=Schema,CN=Configuration,DCROOT
ObjectClass: attributeSchema
oMSyntax: 20
rangeLower: 1
rangeUpper: 256
showInAdvancedViewOnly: TRUE
Note - A shell script is available for UNIX gateways. The script is at:
$FWDIR/lib/ldap/update_schema_microsoft_ad
of the query are taken from the first Account Unit to meet the conditions, or from all the
Account Units which meet the conditions.
4. If the query against all LDAP servers fails, the gateway matches the user against the generic
external user profile.
Example of a Query
If you create a query where:
Attributes = mail
Contains
Value = Andy
The server queries the User Directory with this filter:
filter:(&(|(objectclass=fw1person)(objectclass=person)
(objectclass=organizationalPerson)(objectclass=inetOrgPerson))
(|(cn=Brad)(mail=*Andy*)))
Item Description
1 Security Gateway - Retrieves LDAP user information and CRLs
2 Security Gateway - Queries LDAP user information, retrieves CRLs, and does bind
operations for authentication
7. Click OK.
8. Install the policy.
Account Units
An Account Unit represents branches of user information on one or more LDAP servers. The
Account Unit is the interface between the LDAP servers and the Security Management Server and
Security Gateways.
You can have a number of Account Units representing one or more LDAP servers. Users are
divided among the branches of one Account Unit, or between different Account Units.
Note: When you enable the Identity Awareness and Mobile Access Software Blades, SmartConsole
opens a First Time Configuration Wizard. The Active Directory Integration window of this wizard
lets you create a new AD Account Unit. After you complete the wizard, SmartConsole creates the
AD object and Account Unit.
General Tab
These are the configuration fields in the General tab:
Name - Name for the Account Unit
Comment - Optional comment
Color - Optional color associated with the Account Unit
Profile - LDAP vendor
Domain - Domain of the Active Directory servers, when the same user name is used in
multiple Account Units (this value is also necessary for AD Query and SSO)
Prefix - Prefix for non-Active Directory servers, when the same user name is used in multiple
Account Units
Account Unit usage - Select applicable options:
CRL retrieval - The Security Management Server manages how the CA sends information
about revoked licenses to the Security Gateways
User Management - The Security Management Server uses the user information from this
LDAP server (User Directory must be enabled on the Security Management Server)
Note - LDAP SSO (Single Sign On) is only supported for Account Unit objects that use User
Management.
Active Directory Query - This Active Directory server is used as an Identity Awareness
source.
Note - This option is only available if the Profile is set to Microsoft_AD.
Enable Unicode support - Encoding for LDAP user information in non-English languages
Active Directory SSO configuration - Click to configure Kerberos SSO for Active Directory -
Domain Name, Account Name, Password, and Ticket encryption method
Configuring an LDAP Server
You can add, edit, or delete LDAP server objects.
Note - Make sure there is LDAP connectivity between the Security Management Server
and the LDAP Server that holds the management directory.
Authentication Tab
These are the configuration fields in the Authentication tab:
Use common group path for queries - Select to use one path for all the LDAP group objects
(only one query is necessary for the group objects)
Allowed authentication schemes - Select one or more authentication schemes allowed to
authenticate users in this Account Unit - Check Point Password, SecurID, RADIUS, OS
Password, or TACACS
Users' default values - The default settings for new LDAP users:
User template - Template that you created
Default authentication scheme - one of the authentication schemes selected in the
Allowed authentication schemes section
Limit login failures (optional):
Lock user's account after - Number of login failures, after which the account gets locked
Unlock user's account after - Number of seconds, after which the locked account becomes
unlocked
IKE pre-shared secret encryption key - Pre-shared secret key for IKE users in this Account
Unit
Item Description
1 Security Management Server. Manages user data in User Directory. It has an
Account Unit object, where the two servers are defined.
3 Security Gateway. Queries user data and retrieves CRLs from nearest User Directory
server replication (2).
4 Internet
5 Security Gateway. Queries user data and retrieves CRLs from nearest User Directory
server replication (6).
Access Roles
Access role objects let you configure network access according to:
Networks
Users and user groups
Computers and computer groups
Remote access clients - will be supported with R80.x gateways
After you activate the Identity Awareness Software Blade, you can create access role objects and
use them in the Source and Destination columns of Access Control Policy rules.
Authentication Rules
To make an authentication rule:
1. Add users to user groups.
2. Define an access role ("Access Roles" on page 136) for networks, users and user groups, and
computers and computer groups.
3. Make the authentication rules with the access roles in the Source.
To allow your users to access their resources using their handheld devices, make sure they can
authenticate to the Gateway with client certificates.
In many organizations, the daily task of assigning and maintaining client certificates is done by a
different department than the one that maintains the Security Gateways. The computer help desk,
for example. You can create an administrator that is allowed to use SmartConsole to create client
certificates, while restricting other permissions ("Giving Permissions for Client Certificates" on
page 141).
To configure client certificates, open SmartConsole and go to Security Policies > Access Control >
Access Tools > Client Certificates.
To configure the Mobile Access policy, go to Security Policies > Shared Policies > Mobile Access.
This opens SmartDashboard. The Client Certificates page in SmartConsole is a shortcut to the
SmartDashboard Mobile Access tab, Client Certificates page.
Revoking Certificates
If the status of a certificate is Pending Enrollment, after you revoke it, the certificate does not
show in the Client Certificate list.
Cloning a Template
Clone an email template to create a template that is similar to one that already exists.
High Availability is redundancy and database backup for management servers. Synchronized
servers have the same policies, rules, user definitions, network objects, and system configuration
settings. The first management server installed is the primary. If the primary Security
Management Server fails, or is off line for maintenance, the secondary server takes over.
Note: High Availability for Security Gateways is covered the Security Gateway Technical Reference
Guide and the ClusterXL Administration Guide.
While the Active Security Management Server is taking a snapshot (step 2 above), the databases
are locked and you cannot add, change or delete these system objects:
Security Gateways, Security Management Servers and other network objects
VPN Communities
Services, resources and OPSEC applications
Policies and rules
Deployment rules and packages
Reports and queries
This is necessary to prevent database corruption and other errors.
If the environment includes Endpoint Security, the Active Security Management Server and clients
continue to dynamically update these database objects even while the Security Management
Server takes a snapshot:
Full Disk Encryption recovery data
Media Encryption & Port Protection recovery data
Endpoint monitoring data
Endpoint heartbeat data
Synchronization Status
The High Availability status window shows this information about synchronization between the
active and standby servers:
Name, status, and actions of the connected server
Names, statuses, and actions of peers
Status messages can be general, or apply to a specified active or standby server. General
messages show in the yellow overview banner.
No SIC
Solution:
1. Open the Properties window of the Security Management Server.
2. On the General Properties page, click Test SIC Status.
3. Follow the instructions in the SIC Status window.
Not communicating
Solution:
1. From the main SmartConsole menu, select Management High Availability.
The High Availability Status window opens.
2. For the active server, click Actions > Sync now.
Collision or HA Conflict
More than one management server is configured as active. Solution:
1. From the main SmartConsole menu, select Management High Availability.
The High Availability Status window opens.
2. Use the Actions button to set one of the active servers to standby.
Command Description
cppkg delete
Delete a package from the package repository.
cppkg get
Synchronize the package repository database with the
package repository under $SUROOT.
cppkg getroot
Get the package repository path.
cppkg print
See the contents of the package repository.
cppkg setroot
Create a new repository root directory.
cpridrestart
Restart the Check Point remote installation daemon
(cprid), for product upgrade and installation.
cpridstart
Start the Check Point remote installation daemon (cprid).
cpridstop
Stops the Check Point remote installation daemon (cprid).
cprinstall
Install packages, remotely.
cprinstall boot
Boot a remote computer.
cprinstall cprestart
Restart Check Point services, remotely.
cprinstall cpstart
Start Check Point services, remotely.
cprinstall cpstop
Stop Check Point services, remotely.
cprinstall get
Get details of the packages and the Operating System
installed on a Security Gateway, and update the database.
cprinstall install
Install Check Point packages on remote Security Gateways.
cprinstall uninstall
Uninstall Check Point packages from remote Security
Gateways.
cprinstall verify
See if Check Point packages can be installed.
cpstart
Start Check Point services.
cpstat
See status of Check Point services.
cpstop
Stop Check Point services.
cpwd_admin
Start and monitor critical services (Check Point
WatchDog).
cpwd_admin config
Configure cpwd parameters.
cpwd_admin exist
Test if cpwd is alive.
cpwd_admin kill
Stop cpwd.
Command Description
cpwd_admin list
See status of processes being monitored by cpwd.
cpwd_admin monitor_list
See processes actively being monitored.
cpwd_admin start
Starts a new process by cpwd.
cpwd_admin start_monitor
Starts continuous monitoring on this server
cpwd_admin stop
Stops a process which is being monitored by cpwd.
cpwd_admin stop_monitor
Stops continuous monitoring on this server
dbedit
Change objects on the Security Management Server.
DBTableStat
See summary of logs.
dynamic_objects
Specify an IP address to which a dynamic object will be
resolved.
fw
Manage Firewall on a Security Gateway.
fw ctl
Control the Security Gateway kernel.
fw fetch
Get the Inspection Code from a host and install it in the
kernel.
fw fetchlogs
Get logs from a remote computer.
fw hastat
See High Availability servers and their states.
fw kill
Stop all Firewall daemons on a Security Gateway.
fw lea_notify
Send a LEA_COL_LOGS event to connected lea clients (see
the LEA Specification documentation).
fw lichosts
See hosts protected by the Security Gateways.
fw log
See the content of Log files.
fw logswitch
Create a new active Log File.
fw mergefiles
Merge Log Files into one Log File.
fw lslogs
See Log Files on a remote or local machine.
fw putkey
Install an authentication password on a host.
fw repairlog
Rebuild a Log file's pointer files.
fw sam
Manage the Suspicious Activity Monitoring (SAM) server, to
block connections to and from IP addresses, for rapid
response.
Command Description
fwm
Manage Security Management Server daemons.
fwm dbimport
Import users to the User Database from an external file.
fwm dbexport
Export the User Database to a file.
fwm dbload
Download the User Database and network objects to
selected targets.
fwm ikecrypt
Encrypt the password of a SecuRemote user.
fwm load
Compile and install a Security Policy on VPN Security
Gateways.
fwm logexport
Export the Log file to an ASCII file.
fwm unload <targets>
Uninstall the loaded Inspection Code from selected
targets.
fwm ver
See the build number of Check Point products.
fwm verify <policy-name>
Test a Policy Package without installing it.
inet_alert
Send an alert to your Internet Service Provider when under
attack.
ldapcmd
Manage LDAP processes.
ldapcompare
Compare queries that print a message.
ldapconvert
Port from Member mode to MemberOf mode.
ldapmodify
Import users to an LDAP server.
ldapsearch
Query an LDAP directory.
log_export
Transfers Log data to an external database.
queryDB_util
Query the object database.
rs_db_tool
Manage DAIP Modules in a DAIP database.
sam_alert
Run Suspicious Activity Monitoring with the Check Point
User Defined alerts mechanism.
In This Appendix
CRL Management .......................................................................................................155
Using the ICA Management Tool ...............................................................................156
Enabling and Connecting to the ICA Management Tool ...........................................156
The ICA Management Tool GUI ..................................................................................157
User Certificate Management ....................................................................................157
Performing Multiple Simultaneous Operations ........................................................158
ICA Administrators with Reduced Privileges ............................................................159
Management of SIC Certificates ................................................................................159
Management of Gateway VPN Certificates ...............................................................159
Management of User Certificates in SmartConsole .................................................159
Notifying Users about Certificate Initialization .........................................................159
Retrieving the ICA Certificate.....................................................................................159
Searching for a Certificate .........................................................................................160
Removing and Revoking Certificates and Sending Email Notifications ..................161
Submitting a Certificate Request to the CA ..............................................................162
Initializing Multiple Certificates Simultaneously ......................................................163
CRL Operations ...........................................................................................................164
CA Cleanup ..................................................................................................................164
Configuring the CA......................................................................................................164
CA Data Types and Attributes ....................................................................................165
Certificate Longevity and Statuses ............................................................................168
CRL Management
By default, the CRL is valid for one week. This value can be configured. New CRLs are issued:
When approximately 60% of the CRL validity period has passed
Immediately following the revocation of a certificate
It is possible to recreate a specified CRL using the ICA Management Tool. The utility acts as a
recovery mechanism in the event that the CRL is deleted or corrupted. An administrator can
download a DER encoded version of the CRL using the ICA Management Tool.
CRL Modes
The ICA can issue multiple CRLs. Multiple CRLs prevent one CRL from becoming larger than 10K.
If the CRL exceeds 10K, IKE negotiations can fail when trying to open VPN tunnels.
Multiple CRLs are created by attributing each certificate issued to a specified CRL. If revoked, the
serial number of the certificate shows in the specified CRL.
The CRL Distribution Point (CRLDP) extension of the certificate contains the URL of the specified
CRL. This ensures that the correct CRL is retrieved when the certificate is validated.
Option Description
on Starts the ICA Management Tool (by opening port 18265)
off Stops the ICA Management Tool (by closing port 18265)
-a "administrator DN" ... Sets the DNs of the administrators that will be allowed to
use the ICA Management Tool
-u "user DN" ... Sets the DNs of users allowed to use the ICA Management
Tool. An option intended for administrators with limited
privileges.
Note: If cpca_client is run without -a or -u parameters, the list of the allowed users and
administrators remains unchanged.
2 Operations Pane
Manage certificates. The window divides into Search attributes configuration and Bulk
operation configuration.
Create Certificates.
Configure the CA. Contains configuration parameters You can also view the CA's time,
name, and the version and build number of the Security Management Server.
Manage CRLs. Download, publish, and recreate CRLs.
3 Search Results Pane. The results of the applied operation show in this pane. This window
consists of a table with a list of certificates and certificate attributes.
Connect to the ICA Management tool using a browser and HTTPS connection.
Important: Before connecting, make sure to add an administrator certificate to the browser's
store.
To do a certificate search:
In the Manage Certificates page, enter the search parameters, and click Search.
The mail includes the authorization codes. Messages to users that do not have an email
defined are sent to a default address. For more, see Notifying Users about Certificate
Initialization (on page 159).
To initiate a certificate:
1. In the Menu pane, select Create Certificates > Initiate.
2. Enter a User Name or Full DN, or click Advanced and fill in the form:
Certificate Expiration Date - Select a date or enter the date in the format dd-mmm-yyyy
[hh:mm:ss] (the default value is two years from the date of creation)
Registration Key Expiration Date - Select a date or enter the date in the format
dd-mmm-yyyy [hh:mm:ss] (the default value is two weeks from the date of creation)
3. Click Go.
A registration key is created and show in the Results pane.
If necessary, click Send mail to user to email the registration key. The number of characters in
the email is limited to 1900.
4. The certificate becomes usable after entering the correct registration key.
To generate a certificate:
1. In the Menu pane, select Create Certificates > Generate.
2. Enter a User Name or Full DN, or click Advanced and fill in the form:
Certificate Expiration Date - Select a date or enter the date in the format dd-mm-yyyy
[hh:mm:ss] (the default value is two years from the date of creation)
Registration Key Expiration Date - Select a date or enter the date in the format
dd-mm-yyyy [hh:mm:ss] (the default value is two weeks from the date of creation)
3. Enter a password.
4. Click Go.
5. Save the P12 file, and supply it to the user.
For more information, see User Directory ("LDAP and User Directory" on page 104).
CRL Operations
You can download, update, or recreate CRLs through the ICA management tool.
CA Cleanup
To clean up the CA, you must remove the expired certificates. Before you do that, make sure that
the time set on the Security Management Server is correct.
Configuring the CA
To configure the CA:
1. In the Menu pane, select Configure the CA.
2. Edit the CA data values ("CA Data Types and Attributes" on page 165) as necessary.
3. In the Operations pane, select an operation:
Apply - Save and enter the CA configuration settings.
If the values are valid, the configured settings become immediately effective. All non-valid
strings are changed to the default values.
Cancel - Reset all values to the values in the last saved configuration.
Restore Default - Revert the CA to its default configuration settings.
Entering the string Default in one of the attributes will also reset it to the default after
you click Configure. Values that are valid will be changed as requested, and others will
change to default values.
Grace Period Before The amount of time the old min-0 1 week
Revocation certificate will remain in
max-5 years
Renewed (superseded)
state.
IKE Certificate Validity The amount of time an IKE min-10 minutes 5 years
Period certificate will be valid.
max-20 years
Management Tool Hide For security reasons the true or false false
Mail Button mail sending button after
displaying a single
certificate can be hidden.
Management Tool User The amount of time that a min-one week 2 years
Certificate Validity user certificate is valid
max-20 years
Period when initiated using the
Management Tool.
New CRL Mode A Boolean value describing 0 for old CRL true
the CRL mode. mode
1 for new mode
SIC Key Size The key size in bits of keys possible values: 1024
used in SIC.
1024
2048
4096
SIC Certificate Validity The amount of time a SIC min-10 minutes 5 years
Period certificate will be valid.
max-20 years
User Certificate Key The key size in bits of the Possible values 1024
Size user's certificates. are 1024
2048
4096
before the user completes the registration procedure. After that, the administrator can revoke the
user certificate.
Explicit or Automatic Renewal of User certificates ensuring continuous User connectivity
A user certificate of type PKCS12 can be renewed explicitly by the user. A PKCS12 certificate can
also be set to renew automatically when it is about to expire. This renewal operation ensures that
the user can continuously connect to the organization's network. The administrator can choose
when to set the automatic revoke old user certificates.
One more advantage is:
Automatic renewal of SIC certificates ensuring continuous SIC connectivity
SIC certificates are renewed automatically after 75% of the validity time of the certificate has
passed. If, for example, the SIC certificate is valid for five years. After 3.75 years, a new certificate
is created and downloaded automatically to the SIC entity. This automatic renewal ensures that
the SIC connectivity of the gateway is continuous. The administrator can revoke the old certificate
automatically or after a set period of time. By default, the old certificate is revoked one week after
certificate renewal.
Page 172
Installing and Publishing 52 Monitoring Licenses 43
Installing the Threat Prevention Policy 92 More Network Object Types 45
Installing the User Database 51
Interoperable Devices 46 N
Introducing Policy Layers 53 Netscape LDAP Schema 112
Introducing the Access Control Policy 55 Network Groups 41
IPS 73 Network Object Types 41
IPS and Threat Prevention Policy Use Cases Networks 41
85 Notifying Users about Certificate Initialization
IPS Protections Columns 76 159
L O
LDAP 9 Object Categories 39
LDAP and User Directory 104 Object Tags 40
LDAP Groups 9 Objects Management Tab 131
LDAP Groups for the User Directory 135 OID Proprietary Attributes 105
Learning about Malware 73 Operating System Password 95
ListOfAttrsToAvoid 118 Optimized Protection Profile Settings 84
Log Server 9 Order of Rule Enforcement 58
Logical Servers 46 OrganizationObjectClass 119, 123
OrganizationRDN 121
M
OrgUnitObjectClass 119, 123
mail 107 OrgUnitRDN 121
Management API Settings 20 Overview of Creating a Threat Prevention Policy
Management High Availability 144 84
Management of Gateway VPN Certificates 159 Overview of IPS 73
Management of SIC Certificates 159
Management of User Certificates in P
SmartConsole 159 Package 9
Management Server 9 Performing Multiple Simultaneous Operations
Managing Administrator Accounts 22 158
Managing Certificates 101 Permissions for Access Control and Threat
Managing Client Certificates 138 Prevention 26
Managing Gateways 34 Permissions for Monitoring, Logging, Events,
Managing LDAP Information 135 and Reports 26
Managing Network Access Control 59 Permissions Profile 9
Managing Objects 39 PhoneNumberAttr 118
Managing Policy Layers 54 Planning for Management High Availability
Managing Pre-R80 Security Gateways 58 145
Managing Security through API and CLI 19 Planning Security Management 20
Managing Software Blade Licenses 41 Policy 9
Managing the Anti-Bot and Anti-Virus Rule Policy Installation History 53
Base 80 Policy Management 48
Managing URL Filtering and Application Control Predefined Rule 88
62 Preferences and Management Settings 142
Managing User Accounts 95 Preventing IP Spoofing 60
Managing User Groups 103 Profile Attributes 115
Managing Users on a User Directory Server Promoting a Secondary Server to Primary 150
134 Protecting Networks from Bots 78
member 107 Protecting Networks from Viruses 79
memberof template 112 PsswdDateAttr 117
Microsoft Active Directory 124 PsswdDateFormat 116
Modifying the Key Size for User Certificates Publishing 28
158
Modifying the LDAP Server 132 Q
Modifying User Directory Profiles 113 Querying Multiple LDAP Servers 127
Monitoring Bot Activity 89
Monitoring High Availability 146
Page 173
R The Check Point Solution for Internet Browsing
63
RADIUS 95 The Columns of the Access Control Rule Base
Recovery By Creating a New Primary Server 56
150 The High Availability Environment 144
Removing Activation Overrides 77 The ICA Management Tool 155
Removing and Revoking Certificates and The ICA Management Tool GUI 157
Sending Email Notifications 161 The Need for Threat Emulation 81
Restoring Window Defaults 142 The Search Results 161
Retrieving Information from a User Directory The Security Management Server CLI 151
Server 126 The User Directory Schema 105
Retrieving the ICA Certificate 159 Threat Emulation 81
Revoking Administrator Certificate 24 Threat Prevention Components 72
Revoking Certificates 139 Threat Prevention Profiles 87
Rule Base 9 ThreatCloud Emulation 82
Running User Directory Queries 127 ThreatSpect Engine and ThreatCloud Repository
S 73
To get quickly up and running with a Threat
Sample Anti-Bot and Anti-Virus Rule Base 81 Prevention policy: 84
Sample Configuration 94 Tour of SmartConsole 12
Sample Firewall Rule Base 60 Troubleshooting SIC 37
Sample URL Filtering and Application Control Trust State 36
Rules 67 Types of Rules in the Rule Base 56
Scheduling Updates 93
Schema Checking 105 U
Search Engine 16 uid 107
Searching for a Certificate 160 Understanding SmartConsole 12
Secure Internal Communication (SIC) 35 Understanding the Check Point Internal
SecurID 96 Certificate Authority (ICA) 37
Security Gateway 9 Unified Policy 55
Security Management Server 9 Uninstalling a Policy Package 52
Services & Applications 65 Updating IPS Protections 93
Setting High Availability Priority 133 Updating the Gateway Topology 35
Setting IP Address Versions of the Environment Updating the IPS and Malware Databases 92
142 Updating the Registry Settings 125
Setting SmartConsole Timeout 142 User > Authentication 101
Setting Up for Security Management 18 User > General Properties 101
Setting up for Team Work 19 User > Time 101
Setting User-to-Group Membership Mode 114 User Certificate Management 157
Shared Policies 17 User Database 10, 100
SIC 9 User Directory and Identity Awareness 104
SIC Certificate Management 38 User Directory Considerations 104
SIC Status 36 User Directory Profiles 112
SmartConsole 9 User Directory Schema Attributes 106
SmartConsole Toolbars 13 User Groups 10
SmartDashboard 9 User Template 10
Software Blade 10 UserCheck 63
Special URL Filtering and Application Control UserCheck Actions 66
Fields 64 UserLoginAttr 116
Submitting a Certificate Request to the CA 162 UserMembershipAttr 120
Synchronization Status 147 UserObjectClass 119, 123
Synchronizing Active and Standby Servers 146 UserOCOperator 120
T userPassword 107
UserPasswordAttr 116
TACACS 96 UserRDN 122
TemplateMembership 121 Users 10
TemplateMembershipAttr 121 UserTemplateMembershipAttr 121
TemplateObjectClass 116 Using Cloud Emulation 83
Page 174
Using the ICA Management Tool 156
V
Validation Errors 52
Viewing and Saving Certificate Details 161
Viewing Licenses 42
Viewing Rule Logs 52
Visual Division of the Rule Base with Sections
57
VoIP Domains 46
W
Welcome 11
Working with Database Revisions 29
Working with LDAP Account Units 129
Working with Policy Packages 48
Working with Sessions 29
Page 175