R80.10 Cookbook - CPX
R80.10 Cookbook - CPX
(Resource Tab)
To complete tasks, click on SmartConsole shortcut and login with username ‘James’,
password ‘aaaa’ to IP address ‘192.168.88.9‘
1. Click Security Policies (main navigation buttons on the left hand side)
In R80, you can work on multiple policy packages simultaneously. Each tab
represents a policy package.
The ‘+’ tab is where you manage your policy packages. You can create, edit or
delete policy packages.
3. Go to rule number 14 ‘Web access permissions’ and expand the inline layer:
click the black triangle on the left
4. Select rule number 14.1 and create a new rule above it: right-click the rule number >
New Rule > above.
6. In the ‘Service & Application’ column, open the picker (+) and choose the ‘http’
service
7. In the ‘Content’ column, open the picker and choose the ‘PCI – Credit Card
Numbers’ data type.
8. To restrict only upload of data, right click the ‘Content’ cell and set the ‘Data
Direction’ to Up (Upload).
9. In the ‘Action’ column, right-click and select ‘Ask > Personal Data Exposure’.
R80.10 presents a Unified Policy. A single rule can hold multiple security
products.
11. Publish changes: click ‘Publish’ at the center top of the console.
o Edit the session name to be ‘Protect exposure of personal data’ and its
description to be ‘Warn employees on uploading credit card numbers’.
o Click ‘Publish’.
R80 (and higher) presents a built in revision control mechanism. When a session
is published, a new database version is created and shows in the list of database
revisions.
After clicking ‘Install’, a new task will appear on the lower left side of
SmartConsole with policy installation progress.
Click the triangle next to the progress bar to open the ‘Tasks’ pane. In the ‘Tasks’
pane, you can see tasks such as ‘Policy Installation’, ‘IPS Update’ and
‘Applications Update’.
The new Content Awareness Software Blade adds visibility and control over data
transfers in the network traffic, using data types based on content, file types, and
direction.
Objective: A few minutes after the last policy installation, you get a phone call saying
there is a presentation in the conference room for a customer. The demonstration of
uploading a file to FTP, which worked this morning, is now blocked. This issue must be
fixed ASAP.
A short search in the logs leads to the conclusion that rule 21.3 in the Standard
rulebase blocks all external file uploads to the ‘Public FTP Server’.
1. Although it is easy to navigate from a log to the relevant rule, in this demo, we’ll use
a new rulebase feature called “go to rule”:
Press Ctrl+G, enter 21.3, and click OK.
Quickly navigate to a rule in your policy by the rule’s number or the rule’s UID.
2. While the rule is selected, get more information in the rulebase bottom pane:
i. Open the Summary tab - according to the Additional Rule Info, the rule was
created as part of a specific ticket.
ii. Open the History tab. Set the search’s time frame to be ‘All Time’
You can see Paul made this change and you prefer to talk to him first.
The bottom pane provides additional information for a selected rule. This
information lets you make changes with more confidence.
As you understand, this connectivity issue must be fixed immediately and you don’t
have time to deeply investigate it. You want to revert to last known “working point”
as soon as you can.
R80 version (and higher) have a built-in revision mechanism. The quickest way to
get back to a working environment without reverting your management
configuration is to re-install a specific “good” version on the gateway
2. Select CP-GW.
At the bottom you can see all revisions that have been installed on this Gateway.
3. Select the installed policy at 4/13 and click ‘View Installed Changes’.
There are 2 revisions published. One holds your changes and the other is Paul’s.
This issue needs additional investigation.
4. To resolve the connectivity issue, select Walter’s revision from 4/5 and click
‘Install Specific Version’. Confirm: click ‘Install’ and select ‘Yes’ to continue.
After the connectivity issue is fixed, Paul realized he made a mistake. The ticket says
‘block download from Public FTP Server’, but he set ‘Any Direction’ in the Content
column.
R80 version (and higher) offer tools that let you make changes with confidence.
In R80 versions and higher, versions are saved automatically. You can switch to a
specific IPS version or a specific access policy version, to overcome connectivity
issues due to mistakes in a faster, safer and easier way.
To help you complete your task with confidence, you will use management tools such as
Packet Search and Session Pane.
1. Click Security Policies (main navigation buttons on the left hand side)
4. Click in the search bar of the policy and see predefined Search Tokens for searching
the access policy.
5. Click the ‘Services’ token, enter ‘Remote_Desktop_Protocol’ and click the icon.
6. Reviewing results, you realize that only rules 37-40 are candidates to be part of your
new inline layer.
7. Clear the search bar by clicking the button on the search bar.
8. Navigate to the RDP Exceptions section (rules 37-40) and create a new rule below it:
i. Right-click the section and select New Rule > Below.
ii. Name the rule ‘RDP Parent rule’.
9. In the ‘Service & Application’ column, open the picker and select these services:
i. Remote_Desktop_Protocol
ii. Remote_Desktop_Protocol_UDP
11. Move rules 38-41 to the newly created inline layer (above the layer’s cleanup rule)
i. Select the rules.
ii. Right-click the selection and then click ‘Cut’.
iii. Right-click on rule 37.1 and then click ‘Paste -> Above’
Notice the purple marks along the scroll bar. You can quickly navigate to edited
rules.
R80 versions introduce fast navigation features. Click the hamburger icon
located on top of the scroll bar and the one located on the right hand side when
selecting a section header to explore fast navigation options
You made a major change, so before installing the policy, you would like to check
yourself. Use the Packet Search feature to simulate relevant traffic and make sure it
gets into your inline layer.
12. Click in the search bar of the policy and type the following query:
i. To use ‘mode:Packet’, click in the search bar under the Packet Mode section,
and then click On.
All search results match the parent rule and one of the rules of the ‘RDP
Exception’ layer
Packet Search includes *Any, Negated cell and address ranges. It simulates
packet enforcement of the gateway.
Before installing the policy you would like to review your changes.
13. Click ‘Manage & Settings’ from the main navigation buttons on the left hand side.
17. After seeing that changes are correct, publish them: click ‘Publish’ at the center top
of the console. In the pop-up window, click ‘Publish’.
18. Install the policy: click the ‘Install Policy’. In the pop-up window, click ‘Install’.
The Matched Rules tab describes all the various rules across layers that a
connection was matched on, towards the final match decision.
Our New York office has deployed a new local Domain Controller; they would like us to
provide the necessary access to it.
In this task, you’ll be using the ability to share a sub-policy (inline layer) across multiple
places in your policy.
1. Click Security Policies from the main navigation buttons on the left hand side
3. Notice rules 27-31 and rules 32-36, describing the same set of access permissions
provided to MS Domain Controllers over two different sites (Moscow & UK)
Up to R80.10, we would have copied this set of 5 rules to the NY Rules section,
and change the source and destination according to the NY office servers.
4. Go to rule number 22 ‘HQ Domain Controllers Access’ and expand its inline layer:
click the black triangle on the left.
5. In the Action column, right-click Microsoft AD Services > Inline Layer > Edit
Layer…
6. Verify Multiple policies and rules can use this layer is selected and click OK.
Layers can be enabled with FW, Applications & URL Filtering, Content Awareness
and/or Mobile Access capabilities.
7. Go to the NY Rules section (rules 25-26) and create a new rule below it: right-click
the section > New Rule > Below.
8. In the ‘Source’ column, open the picker and select ‘NY Lan’.
10. In the ‘Action’ column, select Inline Layer > Microsoft AD Services.
In the above example we shared the same layer within the same policy.
Layers can also be shared across different policies
Using Layers we managed to share the same set of access rules, to be used in
different places across the policy, instead of copying this set of rules for each site.
This is highly helpful when a change is needed, because a single change in the layer
will automatically apply to all places this layer is used.