SecurityCheckup R80.10 AdminGuide
SecurityCheckup R80.10 AdminGuide
<<Solution Center>>
<<April 8, 2018>>
1. Introduction ................................................................................................................. 3
2. Benefits ....................................................................................................................... 3
3. Notes........................................................................................................................... 4
4. Preparations ................................................................................................................ 5
The Security Checkup Report accentuates Check Point Added Value, exposing security risks
and suggesting remediation. When a Check Point Security Gateway runs in a PoC environment,
inline or Mirror Port, we gain an insight into the activity on the network and will generate logs
and security events for the activated Software Blades. The report gives a comprehensive
security analysis that summarizes security events, their risks, and their remediation actions.
Therefore, the information offered by the Security Checkup together with the in-house security
processes and new enforcement requirements provide the first step for improving the security
architecture of any kind of organization.
2. Benefits
Shows the value of Check Point’s security strategy and the benefits provided by the
Software Defined Protection Architecture.
Visualizes incidents that happen in customer networks, and gives practical
recommendations.
Empowers you with knowledge of new security risks, and improves network security.
Gives an executive summary for discussion with management.
Gives detailed results for in-depth discussions with technical points of contact
Out-of-the-box reports speed information delivery and accelerate the sales processes.
Supports customization for specialized reports focused on customer challenges.
4. Preparations
Software Requirements
1. Download the latest Gaia ISO version - Current version is R80.10 Gaia (link).
2. Download Isomorphic and create R80.10 Gaia bootable USB from ISO - There are two ways
to install the image on the appliance. These includes:
USB CDROM (burn ISO to a DVD).
USB key using ISOmorphic.
o How to install Gaia from a USB device on Check Point appliance and Open
Servers using ISOmorphic Tool (sk65205).
o Updated ISOmorphic (from sk65205).
Hardware Requirements
1. Console cable.
2. Serial to USB adaptor.
3. Network Cables.
4. Blank USB Flash disk or USB CDROM DVD for reimaging.
5. PC with at least Windows 7, 32 bit to install the SmartConsole.
It is recommended to collect the following information from the customer and prepare the
appliance before arriving to the customer’s site.
Internet Connection
An internet connection is required for updates, hotfixes and required software. In case that you
don’t have internet access:
URL Filtering, Anti-bot and Cloud Threat Emulation won’t work.
IPS and Anti-Virus signatures need to be updated offline.
7. Enter the boot option according to the connection type you are using:
Local disc - for booting from local hard disk.
Serial - for serial connection (2012 models, 2016 models, Smart 1 5/25/50/200/3000
models, TE models).
Smart - 1 150- only for installing on Smart-1 150 Appliance.
VGA - for VGA or other graphic mode connection (only for Open Servers with video
card).
Note: If no option is entered in the SYSLINUX window, then after 90 seconds the installation
will continue with the default option based on the installation type that was selected when
preparing the USB device:
If you selected 'Regular installation' type, then the default option is localdrive, i.e., the
installation from USB device will be aborted and machine will boot from the local drive.
If you selected 'Unattended installation' type, then the default option is serial.
9. Unplug the USB and reboot the appliance (Ctrl C from the console).
Warning: Do NOT forget to unplug the USB device from the Appliance. Otherwise, if you
have used the 'Unattended installation' type for preparing the USB device, the local drive will
be formatted without any user confirmation once the machine is rebooted.
8. Select your setup option - choose Quick Standalone setup of R80.10 and continue to
perform a regular installation.
Warning: Do not change the main IP address of the management after this point, if you
do it is likely that SmartEvent will not function correctly.
For the Security Checkup process we recommend only to use the same password as
the system administrator. It is also recommended to make the password standard for the
Security Check-up reports to allow any administrator to complete the report if the
engineer who set up the appliance is not available.
Note that once the initial Quick Setup finished the device performs updates. It is recommended
to let these updates finish before attempting to perform any additional configuration.
To verify that all updates have finished run this command
tail –f /var/log/ftw_install.log
and wait till you see the following message:
end policy load
Important - review the configuration in chapter #8 because the script and first time wizard don’t
include all settings yet.
Once the license is in your UC account the license will need to be activated against the IP
assigned to the appliance. The example below uses 192.0.2.254, but it depends on your
assignment of the management interface.
.
Log-in to the Gaia dashboard.
Activate the Advanced View mode in the menu on the left and scroll to the Upgrades
(CPUSE) section.
Update the CPUSE agent if required in the main screen.
Proceed in showing all available Hot Fixes and HFAs. Install them one by one as required,
depending on their content and their need. (Screenshot below).
Enable and ensure that the SPAN interface does not have IP address.
Select the Ethernet tab and select monitor mode. In this step it is important to check if Auto
Negotiation or fixed link speeds will be used. Remember both Security Gateways and switch
MUST have the same configuration.
Change the default route to be as supplied by the customer on the LAN interface for Internet
access for the appliance by selecting “IPv4 static routes” on the left menu and select the
default route. This will facilitate updates for the gateway and the real time Threat Prevention
data.
Tip: you can add alias addresses on this interface to save configuration time on site.
To test that the internet connectivity is correct for the installation, login to expert on the console
or ssh. The following commands from the command line will confirm that most of the required
network connectivity is working:
ping google.com
PING google.com (150.101.213.174) 56(84) bytes of data.
64 bytes from google.com (150.101.213.174): icmp_seq=1 ttl=60 time=26.0 ms
curl_cli cws.checkpoint.com
<html><body><h1>It works!</h1></body></html>
You also might need to configure Internet access through a proxy. To configure it you must
enable proxy from the Gaia Web Interface and from the Global Properties (through the
SmartConsole) option:
Install blades as shown by ticking the appropriate boxes below that have not been ticked.
Note, all blades but DLP and Identity Awareness are activated by default with the Gaia quick
setup.
*In case that there is no connection to the internet, disable URL Filtering.
Access Control
To keep the log file small, configure the following layers and rules:
a. FW Layer (FW is enabled).
Source = Any, Destination = Any, Action = Accept, Track = None.
b. APP&URLF and Content Layer - In a new layer that Applications & URL Filtering and
Content Awareness are enabled.
1. Source = Any, Destination = Internet, Content = Upload Traffic (Any File), Action =
Accept, Track = Detailed log (Accounting).
Go to the Manage and Settings > Blades > Application Control & URL Filtering and enable
the following options:
a. Allow all requests (fail open) in case of internal system error.
b. Categorize HTTPS sites.
c. Categorize cached pages.
Threat Prevention
In the Threat Prevention Profiles, edit the Optimized Profile and ensure you are using a detect-
only policy as follow:
Inspect incoming files from “all interfaces” or inspect incoming and outgoing files.
For the Mail (SMTP) change the nested file types settings to “Allow”.
Inspect incoming files from “all interfaces” or inspect incoming and outgoing files.
Process all file types.
For getting an excellent catch rate for a Security Checkup Report, you can enable the
Aggressive Detection mode for Check Point Anti-Virus (Sk98099).
If your customer has concerns about the Cloud Emulation, there are options to restrict the
geographical area where the emulation is conducted. Please refer to sk97877
Threat Emulation
Tick the Threat Emulation blade (if already done you can untick and re-tick to check).
Activating Threat Emulation on the cloud will verify the subscription over the Internet and
validate the blade:
Identity Awareness is recommended but optional. This should be turned on at the customer site
as connectivity with the AD server is required and customer will be required to enter the domain
password.
For this step remember that the PC where you are executing the SmartConsole must have IP
connectivity to the Domain Controller. Also make sure you set the correct DNS settings with the
Domain Controller as your PC’s primary DNS server.
If Identity Awareness was enabled and you would like to present the users name in the Security
Checkup report it is possible to edit the report > open the relevant view and add the User field.
When activating the DLP blade follow the wizard including the domain of the customer you are
going to run the Security Check-up at.
You also will be requested to set names and keywords to refer to the company. If the
organisation has multiple names then enter them here.
If users at customer site browse the internet via proxy and the mirror port is upstream of that
proxy:
1. In SmartConsole, go to the Objects Tree and select the Services tab
2. Edit the TCP service: HTTP_and_HTTPS_proxy
3. Click Advanced
4. Enable Match for ‘Any’
5. Click OK
If the customer has Network storage with confidential data, it is highly recommended to enable
the fingerprint on this and the DLP catch rate will improve.
To save CPU:
Disable “Log all sent messages”.
Tick disable when under load.
To complete installation, install policy (Ignore the topology warning regarding missing Anti-
spoofing).
IPS
Assign recommended protection under the IPS properties of the Gateway and Perform IPS
on All traffic. To avoid the risk of a box lockup you can select to bypass IPS inspection under
heavy load.
The following method can be used to install and test the appliance onsite.
1. Connect to Management Interface directly with laptop.
2. Connect Customer LAN port only first.
(Less load on the box to test Internet connectivity without SPAN connected).
3. Login to Expert Mode via CLI.
4. Check DNS is functioning - “nslookup google.com”.
5. Check Internet access is functioning - “curl http://google.com”.
6. Plug in cable to SPAN port.
7. Test for traffic on SPAN port at Expert Mode type command.
tcpdump –i eth1 port 80 -n
-i = Interface
eth1 = span port
port = port number
This will ensure visibility of HTTP traffic and not just broadcasts and confirm the SPAN is
correctly configured.
8. Login to Logs&Monitor and confirm it is functioning and we are receiving events.
1. Log into R80.10 SmartConsole and move to Logs & Monitor > Reports.
2. Double click on one of the reports and select the relevant period of time according to the
collected logs.
1. Set up a Check Point standalone gateway with relevant Security and Management Software Blades
activated. SmartEvent server is not required.
2. Plug the device into the customer network to inspect mirrored or inline traffic (recommended
monitoring duration: at least 1 week) - see sk83500 and chapters 4-8 in this document.
3. After the standard set up is done, run a script which automatically upload the logs after X days
(recommended - at least one week). To obtain the package, download the CloudService Script.
4. Reports are generated in the Cloud Service and sent back to the Partner/SE encrypted via email.
5. You can also view the incidents in the cloud management, custom the report and use it as regular
SmartEvent machine.
*Note that the Security Checkup in the Cloud is limited up to 40GB of logs in version_19.
For more information on Security Checkup in the Cloud, view sk112732 and download the Cloud Service
Package.
WebGUI
Licenses
Generate a 30 days all in one bundle eval and attach via preferred method (CLISH,
CPUSE(webui), SmartUpdate etc).
Ensure all contracts (IPS, TE etc.) are attached and showing as valid.
Gateway object
Check all blades that have been selected by customer are switched on after the quick FTW.
Ensure SmartEvent is also switched on and correlation unit is showing no errors.
Define any required proxy server from customer under Topology > Proxy.
Set any required proxy in global properties.
Ensure topology is set correctly.
With anti-spoofing turned off on the interfaces (as default, but double check).
General Configuration
Management IP address doesn't change after initial configuration and SmartEvent set up. It can
cause licensing nightmares as well as problems with logging and correlation units.
Define every single internal network expected to be seen in the traffic flow as an object under
the 'networks' folder in network objects.
Turn FW logging off - this generates surplus FW logs which we do not need in the Security
Checkup report.
Ensure subnet masks are correct for customers network.
Create a group object of all of the 'network' objects.
Ensure DNS settings are set and defined for customer network.
If configuring appliance before site installation ensure these DNS IP's are on hand during install
as an internet connection will be needed for license checks and protection updates (IPS, AV &
AB, URLF & Application Control).
Ensure that the database update was carried out successfully on the Checkup gateway
under ’gateways’. If not push policy (or remember to push policy after completing the Checkup
checklist).
Ensure application database is up to date. If not, update it from the overview page.
DLP
Define 'My Organisation' entirely using the networks defined and also include any email / web
domain names.
Select 'specific networkand and hosts' and use objects after clicking the 'edit' button beside the
option in my organisation because the default option looks for 'networks behind internal
interfaces' doesn't work when using mirror ports with TX&RX packet flow on the same
interface.
Add any relevant DLP categories that may relate to the customer you are performing your
Checkup for.
One per line in the DLP policy and be sure to copy and paste the protection definition into the
comment field so the Checkup report knows what the protection does (if you don't, the report
will show something being leaked, but give little to no information on what the protection was
looking for).
Ensure - Web / HTTP has been enabled under DLP > additional settings > protocols.
IPS
Switch IPS policy to Optimized and then either switch on troubleshooting mode (switching all
protections to detect and still logging) or select all protect IPS protections in recommended
profile and change them to detect normally without using troubleshooting mode.
Troubleshooting mode can be found by double clicking on the enabled profile on the overview
page on IPS blade and clicking troubleshooting on the left hand list.
Ensure that all additional Threat Emulation file types have been enabled.
Ensure update status and subscription status on 'Gateways' page all show good results. Fix any
failed updates / checks.
Updates
Ensure internal networks are defined under SmartEvent Policy > general settings > Internal
network.
Ensure correlation unit is ok and processing logs from the right log server (should all be the
same IP address as MGMT and GW if performing a standalone Checkup)
Connection Checks
If you get a response back from each of these whilst the appliance is installed in the customer site then you
should be good to go.
Check appliance can reach the internet after installation at customer site (ping 8.8.8.8).
Check that it can access the AV AB URL & APP CTL update servers - (Sk83520)
curl -v http://cws.checkpoint.com/Malware/SystemStatus/type/short
Check that threat emulation can get to the Threat Cloud for emulating files -
curl -v http://te.checkpoint.com
Check that it can update IPS -
curl -v -k https://updates.checkpoint.com/
Download service updates -
curl -v -k https://dl3.checkpoint.com
Contract entitlement check
curl -v -k https://usercenter.checkpoint.com/usercenter/services/ProductCoverageService