Sie sind auf Seite 1von 285

Security Administration

2013 Edition

2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved.
2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties
Preface

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 2
Training Blades and Certification

2 WAYS to EXTEND CCSA / CCSE for 1 YEAR

1.
Take and pass
any 2 Training
Blades OR
+
AppControl Introduction to Gaia

Attend and pass


1 Instructor-led Based on a 2 day course
class
Advanced IPS

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 3
Certification Renewal Examples

CCSA Certification CCSE Certification


Extension Options Extension Options

Training Blades: Instructor Led Training


Application Control Advanced IPS
Data Loss Prevention
SmartConsole Managed
Introduction to Gaia VSX
Intrusion Prevention P1 Managed VSX
Threat Prevention Endpoint
CCSA exam CCSE exam

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 4
Check Point Security Administration

Key Course Elements

Overview of Check Point Technology


Deploying a Security Policy and Monitoring
Traffic
Managing Users and Providing Access to
Protected Resources
Deploying Network Address Translation and
VPNs
2

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 5
Course Chapters

1. Introduction to Check Point Technology


2. Deployment Platforms
3. Introduction to the Security Policy
4. Monitoring Traffic and Connections
5. Network Address Translation
6. Using SmartUpdate
7. User Management and Authentication
8. Identity Awareness
9. Introduction to Check Point VPNs 3

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 6
Lab Topology

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 7
Introduction to Check Point Technology

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 8
Introduction to Check Point Technology

Learning Objectives

Describe Check Points unified approach to


network management, and the key elements
of this architecture
Design a distributed environment using the
network detailed in the course topology
Install the Security Gateway in a distributed
environment, using the network detailed in
the course topology
8

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 9
Introduction to Check Point Technology

Check Point Security Management Architecture (SMART)

The Check Point Security Management Architecture


(SMART) is a core component of the Check Point unified
security architecture.
With SMART security administrators can centrally configure,
manage, monitor and report on all security devices,
including endpoints, from a single console - the
SmartDashboard

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 10
Introduction to Check Point Technology

Core Systems

The Check Point core systems:


SmartConsole
Security Management Server
Security Gateway

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 11
Introduction to Check Point Technology

SMART

SmartConsole:
The SmartCenter GUI, SmartConsole is comprised of several
clients, used to manage the Check Point security environment.

Security Management Server:


The Security Management Server stores and distributes
Security Policies to multiple Security Gateways.

Security Gateway:
The Security Gateway is the firewalled machine on which the
firewall software is installed, and is based on Stateful
Inspection.
10

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 12
Introduction to Check Point Technology

The Open Systems Interconnect (OSI) Model

To better understand the capabilities of the basic firewall,


understand the OSI model.

11

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 13
Introduction to Check Point Technology

Controlling Network Traffic

Check Point utilizes these technologies to deny or permit


traffic, based on defined rules:

Packet Filtering

Stateful Inspection

Application Intelligence
12

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 14
Introduction to Check Point Technology

Packet Filtering

Packet Filtering is a
firewall in its most basic
form

13

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 15
Introduction to Check Point Technology

Stateful Inspection

Stateful Inspection
examinees the context
of a packet to
monitoring the state of
the connection:

14

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 16
Introduction to Check Point Technology

Application Intelligence

Application
Intelligence works
with application-
layer defense:

15

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 17
Introduction to Check Point Technology

Security Gateway Inspection Architecture

15

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 18
Introduction to Check Point Technology

INSPECT Engine Packet Flow

Sample flow of new


inbound packet:

16-17

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 19
Introduction to Check Point Technology

Deployment Considerations

18

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 20
Introduction to Check Point Technology

Standalone Deployment

Security Management Server and Security Gateway


installed on same computer.

19

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 21
Introduction to Check Point Technology

Distributed Deployment

Security Management Server and Security Gateway


installed on different computers.

19

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 22
Introduction to Check Point Technology

Standalone Full HA Deployment

Security Management Server and Security Gateway


installed on different computers.

20

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 23
Introduction to Check Point Technology

Bridge Mode

A bridge mode deployment adds a Security Gateway to an


existing environment without changing IP Routing.

20

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 24
Introduction to Check Point Technology

Check Point SmartConsole Clients

SmartConsole is
comprised of
several clients,
used to manage
the security
environment.

21

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 25
Introduction to Check Point Technology

SmartDashboard

Tabs:
Firewall
App Control &
URl Filtering
DLP
IPS
Anti Bot & Anti-
Virus
Anti Spam and
Mail
Mobile Access
IPSec VPN
QoS
Desktop
21

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 26
Introduction to Check Point Technology

Check Point SmartConsole

SmartConsole
components can be
accessed from
SmartDashboard.

22

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 27
Introduction to Check Point Technology

SmartView Tracker

SmartView Tracker
is used for
managing and
tracking logs and
alerts.

23

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 28
Introduction to Check Point Technology

SmartLog

SmartLog enables
enterprises to
centrally track log
records.

24

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 29
Introduction to Check Point Technology

SmartEvent

Event correlation
for firewall, IPS,
DLP, endpoints via
a single console.

24-25

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 30
Introduction to Check Point Technology

SmartView Monitor

SmartView Monitor
centrally monitors Check
Point and OPSEC
devices, presenting a
complete visual picture of
changes to gateways,
tunnels, remote users
and security activities.

26-27

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 31
Introduction to Check Point Technology

SmartReporter

SmartReporter
centralizes network
security reporting.

27

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 32
Introduction to Check Point Technology

SmartUpdate

SmartUpdate
delivers automated
software and license
to distributed
security gateways
from a single
management
console.

28

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 33
Introduction to Check Point Technology

SmartProvisioning

SmartProvisioning
provides centralized
administration and
provisioning of
Check Point security
devices via a single
management
console.

29

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 34
Introduction to Check Point Technology

SmartEndpoint

SmartEndpoint is
the management
console for endpoint
clients and their
features.

31

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 35
Introduction to Check Point Technology

Security Management Server

The Security Management Server is used to manage the


Security Policy.
The Security Management Server maintains the Security
Gateway databases
Policies are defined using SmartDashboard, and saved on
the Security Management Server

32

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 36
Introduction to Check Point Technology

Managing Users in SmartDashboard

32

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 37
Introduction to Check Point Technology

Securing Channels of Communication

Communication must be encrypted


Communication must be authenticated
Transmitted communication should have
data integrity
SIC setup process allowing the
intercommunication to take place must be
user friendly

34

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 38
Introduction to Check Point Technology

SIC Between Security Management Servers


and Components

SIC among
Security
Management
Servers and
components

36-37

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 39
Introduction to Check Point Technology

Lab Practice

Lab 1: Distributed Installation


Lab 2: Branch Office Security Gateway Installation

38

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 40
Introduction to Check Point Technology

Review Questions

1. What is the strength of Check Points Stateful


Inspection Technology?

38

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 41
Introduction to Check Point Technology

Review Questions

1. What is the strength of Check Points Stateful


Inspection Technology?
The contents of the packet is examined, not just the
header information.
The state of the connection is monitored.

38

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 42
Introduction to Check Point Technology

Review Questions

2. What are the advantages of Check Points Secure


Management Architecture (SMART)?

38

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 43
Introduction to Check Point Technology

Review Questions

2. What are the advantages of Check Points Secure


Management Architecture (SMART)?
SMART is a unified approach to centralizing Policy
management and configuration, including monitoring,
logging, analysis, and reporting within a single control
center.

38

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 44
Introduction to Check Point Technology

Review Questions

3. What is the main purpose for the Security


Management Server? Which function is it necessary
to perform on the Security Management Server
when incorporating Security Gateways into the
network?

38

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 45
Introduction to Check Point Technology

Review Questions

3. What is the main purpose for the Security


Management Server? Which function is it necessary
to perform on the Security Management Server when
incorporating Security Gateways into the network?
Used by the Security Administrator, the Security
Management Server manages the Security Policy. In
order to perform that role, the Security Management
Server must establish SIC with other components, so
that communication is verified and management can
be performed on any component on the network.
38

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 46
Deployment Platforms

39

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 47
Deployment Platforms

Learning Objectives

Given network specifications, perform a


backup and restore the current Gateway
installation from the command line.
Identify critical files needed to purge or
backup, import and export users and groups
and add or delete administrators from the
command line.
Deploy Gateways using sysconfig and
cpconfig from the Gateway command line.
40

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 48
Introduction to Check Point Technology

Security Appliances

Check Point Security Appliances are integrated hardware


devices that are preinstalled with essential software blades
to produce a comprehensive, turnkey security gateway
solution.

41

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 49
Introduction to Check Point Technology

Security Appliances

Data Center:
61000 Security System - fastest
security appliance, offering scalable
performance for data centers and
telecommunication companies.
21000 Appliance - industry's best
security performance in their class and
offer unmatched scalability, serviceability
and port density.
IAS Bladed Hardware - provides
organizations with the ultimate choice in
carrier-grade chassis. 41

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 50
Introduction to Check Point Technology

Security Appliances

Large Enterprise:
12000 Appliance - multi-core security
technology and high port density, are ideally
suited for perimeter security.
IP Appliance - offer turnkey and modular
security functionality with integrated firewall,
VPN, IPS, Application Control, Identity
Awareness and more.
IAS-D, M, and R Appliance Powered by
HP, the IAS -Series of appliances provide
integrated software and hardware bundles
and direct support that are customized to
organizations' exact specifications. 42

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 51
Introduction to Check Point Technology

Security Appliances

Medium-Sized Business:
4000 Appliance - offer complete and
integrated security solutions in a
compact 1U form factor.

42

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 52
Introduction to Check Point Technology

Security Appliances

Small Business & Branch Office


2200 Appliance - offers enterprise grade security
and performance in a compact desktop form
factor.
Series 80 Appliance Extends Software Blades
to the edge of the network.
UTM-1 Edge All-in-one appliance for branch
offices.
Safe@Office Integrated firewall, IPS, anti-
malware, URL filtering, and more.
Cloud-Managed Security Service Effective
security in a managed solution.

43

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 53
Introduction to Check Point Technology

Security Appliances

Virtualized
Virtual Systems Taps the power of
virtualization to consolidate and simplify
security for private clouds.
Security Gateway Virtual Edition
Protects virtualized environments and
external networks.
Virtual Appliance for Amazon Web
Services Security Gateway for virtual
environments in the Amazon Cloud.
.

44

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 54
Introduction to Check Point Technology

Security Appliances

Dedicated Appliances
Secure Web Gateway Appliance
Real-time protection against web-borne
malware.
Threat Prevention Appliance
Prevents advanced threats and malware
attacks.
DDOS Protector Blocks Denial of
Service attacks within seconds.
.

44-45

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 55
Introduction to Check Point Technology

Check Point Appliance Selection Tool

Check Point Security Power TM


Allows customers to select security appliances by capacity
Accurate appliance sizing to meet needs

45

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 56
Introduction to Check Point Technology

Security Software Blades

Threat Prevention
Threat Cloud Feeds security gateway software blades real-
time security intelligence.

46

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 57
Introduction to Check Point Technology

Security Software Blades

Security Gateway Software Blades


Firewall Industrys strongest level of
gateway security and identity awareness

IPSec VPN Secure connectivity to


corporate networks for remote users

Application Control Application security


and identity control

46

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 58
Introduction to Check Point Technology

Security Software Blades

Security Gateway Software Blades


URL Filtering Optimized web security.

Anti-Bot Detects bot-infected machines,


prevents bot damage

Antivirus Uses ThreatCloud to detect and


blocks malware real-time

46-47

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 59
Introduction to Check Point Technology

Security Software Blades

Security Gateway Software Blades


Identity Awareness Granular visibility of
users, groups, and machines access control

DLP Preemptively protect sensitive


information

Web Security Detects and prevents


attacks launched against the Web
infrastructure

47

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 60
Introduction to Check Point Technology

Security Software Blades

Security Gateway Software Blades


Anti-Spam & Email Security Protection
for messaging infrastructure

Advanced Networking & Clustering


Simplifies complex network security
deployment and management

Voice over IP Deploys secure VoIP


applications

47-48

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 61
Introduction to Check Point Technology

Security Software Blades

Remote Access Solutions


Mobile Access Software Blade Safely
connect to corporate applications over
Internet with Smartphone, tablet, or PC

Endpoint Security with Remote Access


Secure and seamless access to corporate
networks remotely

Check Pont GO Turns any PC into your


corporate desktop

48-49

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 62
Introduction to Check Point Technology

Check Point Gaia

Check Point GaiaTM is the unified cutting-edge secure


operating system for all Check Point Appliances, open
servers and virtualized gateways. Gaia was derived from
IPSO and SecurePlatform.

50

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 63
Introduction to Check Point Technology

History Power of Two

IPSO
Developed by Ipsilon Networks
Based on FreeBSD
Hardened secure operating system
Kernel statistics
Purchased from Nokia 2009

50

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 64
Introduction to Check Point Technology

History Power of Two

SecurePlatform
Developed by Check Point
Based on Red Hat
Hardened secure operating system
Management performed through a restricted shell
Supports SecureXL

51

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 65
Introduction to Check Point Technology

Gaia

Combining the best features of IPSO and SecurePlatform


Increase operational efficiency with wide range of features
A secure platform for the most demanding environments
Provides for role-based administration
Web-based user interface for all commands and properties
Compatible with IPSO and SPLAT CLI commands

52

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 66
Introduction to Check Point Technology

Gaia Architecture

Fully compatible with IPSO and SPLAT CLI Commands


Web-Based user interface with search navigation
Role-based administrative access
Support for industry standard authentication
Support for industry standard monitoring
Intelligent software updates
Automatic Security Gateway deployments
53-54

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 67
Introduction to Check Point Technology

Gaia Architecture

Manageable dynamic routing suite


Native IPv4 and IPv6 support
Link aggregation
ClusterXL or VRRP clusters
High connection capacity
Full software blade support

55

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 68
Introduction to Check Point Technology

Gaia System Information

Gaia system information is accessible through the WebUI,


and some CLI commands.

58

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 69
Introduction to Check Point Technology

Gaia Architecture

Gaia Widgets
System Overview
Network Configuration
Memory Monitor
CPU Monitor
Security Configuration

59

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 70
Introduction to Check Point Technology

Lab Practice

Lab 3: CLI Tools

60

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 71
Introduction to Check Point Technology

Review Questions

1. What are some of the advantages in deploying


UTM-1 Edge Appliances?

60

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 72
Introduction to Check Point Technology

Review Questions

1. What are some of the advantages in deploying


UTM-1 Edge Appliances?
Easy to install and configure
Can participate in corporate VPN
Security Policy can be enforced on the appliance
Status and traffic can be monitored
Device firmware can be automatically updated

60

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 73
Introduction to Check Point Technology

Review Questions

2. How do you manage an IP Appliance?

60

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 74
Introduction to Check Point Technology

Review Questions

2. How do you manage an IP Appliance?


Through the WebUI
Through the CLI

60

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 75
Introduction to Check Point Technology

Review Questions

3. What does SecurePlatform Pro provide over


SecurePlatform?

60

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 76
Introduction to Check Point Technology

Review Questions

3. What does SecurePlatform Pro provide over


SecurePlatform?
Dynamic routing support
Centralized Administrator management via
RADIUS

60

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 77
Introduction to Check Point Technology

Review Questions

4. What are the two critical Check Point directories?

60

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 78
Introduction to Check Point Technology

Review Questions

4. What are the two critical Check Point directories?


$FWDIR/conf contains Rule Bases, objects, and
the user database
$FWDIR/bin contains import and export tools

60

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 79
Introduction to the Security Policy

61

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 80
Introduction to the Security Policy

Learning Objectives

Given the network topology, create and configure network, host and gateway
objects.

Verify SIC establishment between the Security Management Server and the
Gateway using SmartDashboard.

Create a basic Rule Base in SmartDashboard that includes permissions for


administrative users, external services, and LAN outbound use.

Evaluate existing policies and optimize the rules based on current corporate
requirements.

Maintain the Security Management Server with scheduled backups and


policy versions to ensure seamless upgrades and minimal downtime.

62

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 81
Introduction to the Security Policy

Security Policy Basics

The Security Policy is a set of rules that defines your


network security.

63

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 82
Introduction to the Security Policy

Managing Objects in SmartDashboard

64

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 83
Introduction to the Security Policy

Object Types

Network
Services
Resources
Servers and OPSEC Applications
Users and Administrators
VPN Communities

65

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 84
Introduction to the Security Policy

Managing Objects

The Objects Tree is the main view


for managing objects

66

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 85
Introduction to the Security Policy

Creating Objects

When creating objects, consider organizational needs:


What are the physical components in the network?
What are the logical components services, resources,
applications?
What components access the firewall?
Who are the users, how should they be grouped?
Who are the administrators, what are their roles?
Will VPN be used, will it allow remote users?

66

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 86
Introduction to the Security Policy

Creating the Rule Base

Each rule in a Rule Base defines the packets that


match the rule.

68

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 87
Introduction to the Security Policy

Default Rule

The Default Rule is added when you add a rule to the


Rule Base.

69

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 88
Introduction to the Security Policy

Basic Rules

Two basic rules used by nearly all Security Gateway


Administrators
Cleanup rule
Stealth Rule

70

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 89
Introduction to the Security Policy

Implicit/Explicit Rules

71

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 90
Introduction to the Security Policy

Control Connections

There are three types of Control Connections, defined by default


rules:
Gateway specific traffic
Acceptance of IKE and RDP traffic
Communication with various types of servers

71-72

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 91
Introduction to the Security Policy

Detecting IP Spoofing

Spoofing is where an intruder attempts to gain unauthorized access


by altering a packets IP address.

72

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 92
Introduction to the Security Policy

Rule Base Management

Before creating a rulebase:

Which objects are in the network?.


Which user permissions and authentication schemes are
needed?
Which services, including customized services and
sessions, are allowed across the network?

74

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 93
Introduction to the Security Policy

Rule Base Order

1. IP spoofing/IP options
2. First
3. Explicit
4. Before Last
5. Last
6. Implicit Drop
75

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 94
Introduction to the Security Policy

Policy Management and Revision Control

77-78

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 95
Introduction to the Security Policy

Multicasting

Multicasting transmits a single message to a select


group.

80

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 96
Introduction to the Security Policy

Lab Practice

Lab 4: Building a Security Policy


Lab 5: Configuring a DMZ

82

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 97
Introduction to Check Point Technology

Review Questions

1. Objects are created by the Security Administrator to


represent actual hosts and devices, as well as
services and resources, to use when developing the
Security Policy. What should the Administrator
consider before creating objects?

82

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 98
Introduction to Check Point Technology

Review Questions

1. Objects are created by the Security Administrator to


represent actual hosts and devices, as well as
services and resources, to use when developing the
Security Policy. What should the Administrator
consider before creating objects?
What are the physical and logical components
that make up the organization?
Who are the users and administrators, and how
should they be grouped, i.e. access permissions,
location (remote or local), etc?
82

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 99
Introduction to Check Point Technology

Review Questions

2. What are some important considerations when


formulating or updating a Rule Base?

82

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 100
Introduction to Check Point Technology

Review Questions

2. What are some important considerations when


formulating or updating a Rule Base?
Which objects are in the network, i.e., gateways,
routers, hosts, networks, or domains?
Which user permissions and authentication
schemes are required?
Which services, including customized services
and sessions, are allowed across the network?

82

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 101
Monitoring Traffic and Connections

83

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 102
Monitoring Traffic and Connections

Learning Objectives

Use Queries in SmartView Tracker to monitor IPS


and common network traffic and troubleshoot events
using packet data.

Using packet data on a given corporate network,


generate reports, troubleshoot system and security
issues, and ensure network functionality.

Using SmartView Monitor, configure alerts and traffic


counters, view a Gateway's status, monitor
suspicious activity rules, analyze tunnel activity and
monitor remote user access based on corporate
84
requirements.
2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 103
Monitoring Traffic and Connections

SmartView Tracker

85

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 104
Monitoring Traffic and Connections

SmartView Tracker Log Types

Predefined
Custom

85-86

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 105
Monitoring Traffic and Connections

SmartView Tracker Tabs

Network & Endpoint


Active
Management

87

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 106
Monitoring Traffic and Connections

SmartView Tracker Action Icons

88

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 107
Monitoring Traffic and Connections

Log File Management

1. Open Log File


2. Safe Log File As
3. Switch Log File
4. Remote File Management
5. Show or Hide Progress
6. Query Options

89

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 108
Monitoring Traffic and Connections

Administrator Auditing

Administrator login and out


Object creation, deletion,
edits

Rule Base changes

90

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 109
Monitoring Traffic and Connections

Global Logging and Alerting

VPN successful key exchange SLA violations


VPN packet handling errors Connection matched by SAM
VPN configuration and key Dynamic Object resolution
exchange errors failure

IP Options drop Log every authenticated HTTP


connection
Administrative notifications
Log VoIP connection

90-91

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 110
Monitoring Traffic and Connections

Time Settings

Excessive log grace period


SmartView Tracker resolving
Virtual Link statistics logging interval
Status fetching interval

92

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 111
Monitoring Traffic and Connections

Blocking Connections

Block Intruder function

93

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 112
Monitoring Traffic and Connections

SmartView Monitor

High performance network and security analysis

94

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 113
Monitoring Traffic and Connections

SmartView Monitor Customized Views

Create views based on your specific needs, such as:


Status
Traffic
System stats
Tunnels

95

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 114
Monitoring Traffic and Connections

Tunnel View

Monitor the health of your VPN tunnels

96

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 115
Monitoring Traffic and Connections

Remote Users View

Keep track of your VPN remote users

97

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 116
Monitoring Traffic and Connections

Cooperative Enforcement View

Verify host
connections
with Integrity
Server

98

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 117
Monitoring Traffic and Connections

Monitoring Suspicious Activity Rules

Suspicious-activity
monitoring is used to
modify access
privileges, upon
detection of any
suspicious network
activity.

99

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 118
Monitoring Traffic and Connections

Monitoring Alerts

Alerts provide real-time information about


vulnerabilities to computing systems and how
they can be eliminated.
They are defined per product
They may be global or per Gateway
They are displayed and viewed in SmartView Monitor

After reviewing the status of certain clients in


SmartView Monitor, you may:
Disconnect Client
Stop/Start Cluster Member

100

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 119
Monitoring Traffic and Connections

Gateway Status

Status Information:
Check Point Gateways
OPSEC Gateways
Check Point Software Blades

102

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 120
Monitoring Traffic and Connections

Overall Status / Blade Status

OK Working properly

Attention Minor problem

Problem - Malfunction

Waiting 30 second connection period

Disconnected no communication

Untrusted SIC failed

103

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 121
Monitoring Traffic and Connections

SmartView Tracker vs. SmartView Monitor

SmartView Tracker SmartView Monitor


Ensure network components are Centrally monitor Check Point &
operating properly OPSEC devises
Troubleshoot system and security Present a complete picture of
issues changes to Gateways, tunnels,
Gather information for legal or remote users, security activities
audit purposes Maintain high network availability
Generate reports to analyze Improve efficiency of bandwidth use
network-traffic patterns Tack SLA compliance
Terminate connections from
specific IP addresses

105

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 122
Monitoring Traffic and Connections

Lab Practice

Lab 6: Monitoring with SmartView Tracker

106

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 123
Monitoring Traffic and Connections

Review Questions

1. Discuss the benefits of using SmartView Monitor


instead of SmartView Tracker in monitoring network
activity?

106

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 124
Monitoring Traffic and Connections

Review Questions

1. Discuss the benefits of using SmartView Monitor


instead of SmartView Tracker in monitoring network
activity?
SmartView Monitor presents an overall view of changes
throughout the network.
SmartView Tracker focuses on individual connections.
SmartView Monitor also helps the Administrator identify
traffic-flow patterns that may signify malicious activity,
maintain network availability, and improve efficient
bandwidth use.

106

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 125
Monitoring Traffic and Connections

Review Questions

2. Why is there a warning message when switching to


Active mode in SmartView Tracker?

106

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 126
Monitoring Traffic and Connections

Review Questions

2. Why is there a warning message when switching to


Active mode in SmartView Tracker?
There are performance implications for memory and
network resources in Active mode, since data is being
actively logged.

106

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 127
Network Address Translation

107

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 128
Network Address Translation

Learning Objectives

Configure NAT rules on Web and Gateway


Servers

146

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 129
Network Address Translation

Introduction to NAT

Reasons for employing NAT:


Private IP addresses used in internal networks
Limiting external network access
Ease and flexibility of network administration

Source NAT = IP of machine (client) initiating the connection


Destination NAT = IP of machine receiving the connection
109

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 130
Network Address Translation

Types of NAT

Hid NAT (Dynamic NAT)


Many-to-one relationship
Multiple computers represented by one IP address
Only allows connections from protected side of gateway

Static NAT
One-to-one relationship
Each host translated to unique IP address
Connections initiated internally and externally
109

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 131
Network Address Translation

IP Addressing

Addresses allocated for Private Networks


Class A network = 10.0.0.0 10.255.255.255
Class B network = 172.16.0.0 172.31.255.255
Class C network = 192.168.0.0 192.168.255.255

110

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 132
Network Address Translation

Hide NAT

Hide NAT

110

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 133
Network Address Translation

Static NAT

Static NAT

85.10.1.4 10.1.1.101

111

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 134
Network Address Translation

NAT - Global Properties

Allow bi-directional NAT


Translate Destination
on client side
Automatic ARP
Merge manual proxy
ARP

113

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 135
Network Address Translation

Object Configuration Hide NAT

114

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 136
Network Address Translation

Object Configuration Hide NAT

Address translation rules are divided into two elements


Original Packet
Translated Packet

115

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 137
Network Address Translation

Hide NAT Using Another Interface IP Address

116

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 138
Network Address Translation

Static NAT

117

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 139
Network Address Translation

Manual NAT

Instances where remote networks only allow specific IP addresses.


Situations where translation is desired for some services, and not for others.
Environments where more granular control of address translation in VPN
tunnels is needed.

Enterprises where Address Translation Rule Base order must be manipulated.


When port address translation is required.
Environments where granular control of address translation between internal
networks is required.

When a range of IP addresses, rather than a network, will be translated.


118

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 140
Network Address Translation

ARP

If Manual NAT rule creation is used, Gateway ARP table must be edited:
Hide NAT, Security Gateway in Translated Packet, Source field No additional
ARP table entries are required.

Hide NAT, hiding behind an IP address not assigned to the Security Gateway
Add an ARP table entry to the Security Gateway for the hiding address.

Static NAT Add ARP table entries to the Security Gateway for all hiding
addresses.

119

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 141
Network Address Translation

Lab Practice

Lab 7: Configuring NAT

120

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 142
Network Address Translation

Review Questions

1. What are some reasons for employing NAT in a


network?

120

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 143
Network Address Translation

Review Questions

2. When would an Administrator favor using Manual


NAT over Automatic NAT?

120

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 144
Network Address Translation

Review Questions

1. What are some reasons for employing NAT in a


network?
When requiring private IP addresses in internal
network.
To limit external-network access
To ease network administration

120

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 145
Network Address Translation

Review Questions

2. When would an Administrator favor using Manual NAT


over Automatic NAT?
Instances where remote networks only allow specific IPs
Situations where translation is desired for some services, not for others
Environments where more granular control of address translation in VPN
tunnels is needed
Enterprises where Address Translation Rule Base order must be
manipulated
When port address translation is required (port forwarding)
Environments where granular control of address translation between
internal networks is required
When a range of IP addresses, rather than a network, will be translated

120

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 146
Using SmartUpdate

121

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 147
Using SmartUpdate

Learning Objectives

Monitor remote Gateways using


SmartUpdate to evaluate the need for
upgrades, new installations, and license
modifications.
Use SmartUpdate to apply upgrade
packages to single or multiple VPN-1
Gateways.
Upgrade and attach product licenses using
SmartUpdate. 122

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 148
Using SmartUpdate

SmartUpdate and Managing Licenses

123

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 149
Using SmartUpdate

SmartUpdate Architecture

124

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 150
Using SmartUpdate

SmartUpdate Introduction

126

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 151
Using SmartUpdate

Overview of Managing Licenses

127

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 152
Using SmartUpdate

License Terminology

Add Upgrade Status


Attach Get
Certificate Key License Expiration
CPLIC Multi-License File
Detached Features

129

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 153
Using SmartUpdate

License State

Attached
Unattached
Requires Upgrade
Assigned

130

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 154
Using SmartUpdate

Upgrading Licenses

New Licenses need to be attached when:


Existing license expires
Existing license is upgraded
Local license replaced with central license
IP address changes

131

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 155
Using SmartUpdate

Service Contracts

135

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 156
Using SmartUpdate

Service Contracts

136

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 157
Using SmartUpdate

ReviewQuestions

1. What can be upgraded remotely using SmartUpdate?

137

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 158
Using SmartUpdate

ReviewQuestions

1. What can be upgraded remotely using SmartUpdate?


VPN-1 Gateways
Hotfixes, HFAs, and patches
3rd party OPSEC applications
UTM Edge devices
Nokia operating systems
Check Pont Secure Platforms.

137

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 159
Using SmartUpdate

ReviewQuestions

2. What two repositories does SmartUpdate install on the


Security Management Server?

137

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 160
Using SmartUpdate

ReviewQuestions

2. What two repositories does SmartUpdate install on the


Security Management Server?
License & Contract Repository in $CPDIR\conf
PackageRepository in C:\Suroot (Windows), /var/suroot (UNIX).

137

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 161
Using SmartUpdate

ReviewQuestions

3. What does the Pre-Install Verifier check?

137

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 162
Using SmartUpdate

ReviewQuestions

3. What does the Pre-Install Verifier check?


Operating-system compatibility
Disk-space availability
Package not already installed
Package dependencies met

137

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 163
User Management and Authentication

139

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 164
User Management and Authentication

Learning Objectives

Centrally manage users to ensure only


authenticated users securely access the
corporate network either locally or remotely.
Manage users access to the corporate LAN
by using external databases.

140

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 165
User Management and Authentication

Creating Users and Groups

Authentication rules are defined by user


groups.
First define your users, then add them to
groups to define authentication rules.

141

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 166
User Management and Authentication

User Types

External User Profile


Groups
LDAP Groups
Templates
Users

141

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 167
User Management and Authentication

Types of Authentication

User Authentication
Session Authentication
Client Authentication

142

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 168
User Management and Authentication

Authentication Types

143

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 169
User Management and Authentication

Authentication Schemes

Check Point Password


Operating System Password
RADIUS
SecurID
TACACS
Undefined
143-144

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 170
User Management and Authentication

Authentication Schemes

145

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 171
User Management and Authentication

Authentication Types

146

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 172
User Management and Authentication

User Authentication (Legacy)

148

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 173
User Management and Authentication

Session Authentication (Legacy)

149

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 174
User Management and Authentication

Client Authentication Sign-On

152

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 175
User Management and Authentication

Client Authentication Sign-on Methods

Partially Automatic Sign-on


Fully Automatic Sign-on
Agent Automatic Sign-on
Single Sign-on

153

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 176
User Management and Authentication

LDAP User Management with SmartDirectory

LDAP is based on client/server model


Each entry has a unique DN
Default port numbers 389 & 636
Each LDAP server is an Account Unit

156

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 177
User Management and Authentication

Distinguished Name

157

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 178
User Management and Authentication

Multiple LDAP Servers

158

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 179
User Management and Authentication

Configuring Entities to Work with the Gateway

159

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 180
User Management and Authentication

Defining Account Units

160

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 181
User Management and Authentication

Managing Users

161

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 182
User Management and Authentication

UserDirectory Group

162

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 183
User Management and Authentication

Lab Practice

Lab 8: Configure User Directory

163

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 184
User Management and Authentication

Review Questions

1. User Auth can be only used for what services?

163

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 185
User Management and Authentication

Review Questions

1. User Auth can be only used for what services?


Telnet
FTP
HTTP
rlogin
HTTPS

163

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 186
User Management and Authentication

Review Questions

2. When using Session Authentication, what is needed to


retrieve a users identity?

163

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 187
User Management and Authentication

Review Questions

2. When using Session Authentication, what is needed to


retrieve a users identity?
Session Authentication Agent

163

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 188
User Management and Authentication

Review Questions

3. What are the advantages of using multiple LDAP servers?

163

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 189
User Management and Authentication

Review Questions

3. What are the advantages of using multiple LDAP servers?


Compartmentalization
High Availability
Faster access time

163

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 190
User Management and Authentication

Review Questions

4. Why integrate the Security Gateway and SmartDirectory?

163

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 191
User Management and Authentication

Review Questions

4. Why integrate the Security Gateway and User Directory?


To query user info
To enable CRL retrieval
To enable user management
To authenticate users

163

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 192
Identity Awareness

165

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 193
Identity Awareness

Deployment Platforms

Use Identity Awareness to provide granular


level access to network resources.
Acquire user information used by the
Security Gateway to control access.
Define Access Rules for use in an Identity
Awareness rule.
Implementing Identity Awareness in the
Firewall Rule Base 166

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 194
Identity Awareness

Introduction to Identity Awareness

Identity Awareness
configure network access
and auditing based on
network location, identity
of user, identity of
machine

167

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 195
Identity Awareness

Introduction to Identity Awareness

Identity Awareness
shows user activity in
SmartView Tracker and
SmartEvent based on
user and machine name,
not just IP address.

168

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 196
Identity Awareness

AD Query

Recommended for
Identity based auditing and logging
Leveraging identity in Internet application control
Basic identity enforcement in the internal network

Easily deployed, clientless identity acquisition method,


based on Active Directory integration
Transparent to the user

168

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 197
Identity Awareness

Firewall Rule Base Example

169

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 198
Identity Awareness

Scenario: Laptop Access

The gateway policy permits access to HR Web Server only


from John's desktop which is assigned a static IP address
10.0.0.19
John wants access from anywhere in the organization
Current Rule:

170

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 199
Identity Awareness

Scenario: Laptop Access - Solution

John wants to move around the organization and have


access.
Enable Identity Awareness on Gateway
Select AD Query as one of the Identity Sources

170

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 200
Identity Awareness

Scenario: Laptop Access - Solution

Check SmartView Tracker system identifies John in logs

171

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 201
Identity Awareness

Scenario: Laptop Access - Solution

Add access role object to Firewall Rule Base

172

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 202
Identity Awareness

Browser- Based Authentication

Browser-based Authentication acquires identity from


unidentified users.
Acquisition methods:
Captive Portal
Transparent Kerberos Authentication

173

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 203
Identity Awareness

Browser- Based Authentication

Captive Portal authenticates users through a Web


interface. Recommended for:
Identity based enforcement for non AD users
Deployment of Endpoint Identity Agents

173

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 204
Identity Awareness

Browser- Based Authentication

Transparent Kerberos browser attempts to authenticate


users before Captive Portal page opens.
Captive Portal requests authentication data from browser
If request successful, user redirected to destination
If request fails, user must enter Captive Portal credentials

173

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 205
Identity Awareness

Browser- Based Authentication

Captive Portal in Firewall rule base

174

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 206
Identity Awareness

Browser- Based Authentication

Transparent Kerberos:
User wants to access Internal Data Center
Identity Awareness does not recognize user, redirects browser to
Transparent Authentication page
Transparent Authentication page asks browser to authenticate itself
Browser gets Kerberos ticket from Active Directory, and gives to
Transparent Authentication page
Transparent Authentication page sends ticket to Security Gateway,
which authenticates user, redirects to original URL
If Kerberos authentication fails, Identity Awareness redirects browser
to Captive Portal
175

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 207
Identity Awareness

Browser- Based Authentication

Browser-based authentication lets you acquire identities


from unidentified users:
Managed users connecting to network from unknown devices
Unmanaged, guest users such as partners or contractors

175

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 208
Identity Awareness

Scenario: Recognized User from Unmanaged Device

Jennifers accesses internal financial data on her office


computer. She wants to access the same internal financial
data on her iPad.
Enable Identity Awareness on a gateway and select Browser-Based
Authentication as one of the Identity Sources
In the Portal Settings window in the User Access section, make sure
Name and password login is selected
Create a new rule in the Firewall Rule Base to let Jennifer McHanry
access network destinations. Select accept as action
Right-click the Action column Edit Properties to open the Action
Properties
Select Redirect http connection to authentication (captive) portal
Click OK 176

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 209
Identity Awareness

Scenario: Recognized User from Unmanaged Device

From the Source of the rule, right-click to create an Access Role


Enter a Name for the Access Role
In the Users tab, select Specific users, and choose Jennifer
McHanry
In the Machines tab make sure that Any machine is selected
Click OK. The Access Role is added to the rule.

176

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 210
Identity Awareness

Scenario: Recognized User from Unmanaged Device

Jennifer:
Browses to Finance server from iPad
Enters her system credentials in Captive Portal
Is successfully directed to Finance server

176

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 211
Identity Awareness

Scenario: Recognized User from Unmanaged Device

Log entry

177

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 212
Identity Awareness

Scenario: Guest User from Unmanaged Devices

The CEO wants company guests to have Internet access on


their own laptops.
Enable Identity Awareness on a gateway, and select Browser-
Based Authentication as one of the Identity Sources
In the Portal Settings window in the User Access section, make
sure Unregistered guest login is selected
Click the Unregistered guest login Settings and configure:
The data guests must enter
For how long users can access the network resources
If a user agreement is required, and its text

178

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 213
Identity Awareness

Scenario: Guest User from Unmanaged Devices

Create a rule that identified users can access the Internet from
the organization
From the Source of the rule, right-click to create an Access Role
Enter a Name for the Access Role
In the Users tab, select All identified users
Click OK

178

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 214
Identity Awareness

Scenario: Guest User from Unmanaged Devices

Create a rule to let Unauthorized Guests access only the Internet


From the Source of the rule, right-click to create an Access Role
Enter a Name for the Access Role
In the Users tab, select Specific users and choose Unauthenticated
Guests
Click OK. The Access Role is added to the rule
Select Accept as the Action
Right-click the Action column and select Edit Properties
Select Redirect http connections to an authentication (captive) portal
and click OK.

179

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 215
Identity Awareness

Scenario: Recognized User from Unmanaged Device

The Guests:
Browse to an Internet site from their laptop
The Captive Portal opens (they are not identified so cannot
access the Internet)
The enter identifying data in the Captive Portal, and read
through and accept a network access agreement
A welcome window opens
The can successfully browse to the Internet for a specified
period of time

179

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 216
Identity Awareness

Scenario: Guest User from Unmanaged Devices

The SmartView
Tracker log shows
how the system
recognizes a guest

180

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 217
Identity Awareness

Identity Agents

Two types of
Identity Agents
Endpoint Identity
Agents
Terminal Servers
Identity Agents

180-181

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 218
Identity Awareness

Identity Agents

Endpoint Identity Agent recommended for:


Leveraging identity for Data Center protection
Protecting highly sensitive servers
When accuracy in detecting identity is crucial

181

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 219
Identity Awareness

Identity Agents

Using Endpoint Identity Agents gives you:


User and machine identity
Minimal user intervention
Seamless connectivity
Connectivity through roaming
Added security

181

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 220
Identity Awareness

Identity Agents

Types of Endpoint Identity Agents:


Full
Light
Custom

178

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 221
Identity Awareness

Identity Agents

How a user downloads the Endpoint Identity Agent from


the Captive Portal

182

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 222
Identity Awareness

Scenario: Endpoint Identity Agent Deployment & User Group Access

ACME wants only the Finance Department to access the


Finance Web server.
Finance users to be automatically authenticated with SSO
Roaming users to have continuous access to Finance Web
Server
Access to the Finance Web server to be secure, preventing IP
spoofing attempts

183

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 223
Identity Awareness

Scenario: Endpoint Identity Agent Deployment & User Group Access

To make the scenario work:


Enable Identity Awareness on a gateway and select Identity
Agents and Browser-Based Authentication as Identify Source
Click the Browser-Based Authentication Setting button
In the Portal Settings window in the Users Access section,
select Name and password login
In the Identity Agent Deployment from the Portal, select Require
users to download and select Identity Agent Full option
Configure Kerberos SSO

184

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 224
Identity Awareness

Scenario: Endpoint Identity Agent Deployment & User Group Access

Create a rule in the Firewall Rule Base that lets only Finance
Department users access the Finance Web server, and install
policy.
From the Source of the rule, right-click to create an Access Role
Enter a Name for the Access Role
In the Networks tab, select Specific users and add the Active
Directory Finance users group
In the Users tab, select All identified users
In the Machines tab, select All identified machines and select IP
spoofing protection, and click OK

184

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 225
Identity Awareness

Scenario: Endpoint Identity Agent Deployment & User Group Access

The Finance Department user can now browse to the Finance


Web server, where the Captive Portal opens because the user
is not identified and cannot access the server

185

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 226
Identity Awareness

Other Endpoint Identity Agent Options

Other options that can be configured for Endpoint Identity


Agents:
A method that determines how Endpoint Identity Agents connect
to a Security Gateway enabled with Identity Awareness and
trusts it
Access roles to leverage machine awareness
End user interface protection so users cannot access the client
settings
Let users defer client installation for a set time and ask for user
agreement confirmation

185

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 227
Identity Awareness

Scenario: Identifying Users Accessing the Internet through Terminal Servers

ACME wants user access to the Internet through Terminal


Servers and only the Sales Department is to be able to
access Facebook
Sales users will automatically be authenticated with Identity
Awareness when logging in to the Terminal Servers
All connections to the Internet will be identified and logged
Access to Facebook will be restricted to the Sales Departments
users

186

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 228
Identity Awareness

Scenario: Identifying Users Accessing the Internet through Terminal Servers

To enable the Terminal Servers solution, Amy must:


Configure Terminal Server/Citrix Identity Agents as an identity
source for Identity Awareness.
Install a Terminal Servers Identity Agent on each of the
Terminal Servers.
Configure a shared secret between the Terminal Servers
Identity Agents and the Identity Server.
After configuration and installation of the policy, users that log
in to Terminal Servers and browse to the Internet will be
identified and only Sales department users will be able to
access Facebook. 186

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 229
Identity Awareness

Deployment

Perimeter security gateway with Identity Awareness


Most common deployment
Protects access to DMZ and internal network
Can control and inspect outbound traffic
Can create identity-based firewall security Rule Base together
with Application Control

186

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 230
Identity Awareness

Deployment

Data Center Protection


Protect access to segregated server farms
Gateway inline in front of Data Center
All traffic that flows in is inspected by gateway
Identity based access policy controls access to resources and
applications
Can be deployed in transparent (bridge) mode to avoid
changing existing infrastructure

186-187

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 231
Identity Awareness

Deployment

Large scale enterprise deployment


Multiple gateways deployed at different locations
Identity Awareness managed centrally
Identity-based policies distributed to all identity aware
gateways
Identity information about users and machines obtained by
each gateway is shared by all gateways

187

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 232
Identity Awareness

Deployment

Network segregation
Control access between network segments with identity-
based policy
Deploy gateway close to access network to avoid malware
and unauthorized access in global network

187

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 233
Identity Awareness

Deployment

Distributed enterprise with branch offices


Deploy gateway at remote offices to avoid malware and
unauthorized access to headquarters network and Data
Centers
Enable Identity Awareness at branch office gateway so users
authenticate before reaching internal resources
Branch office identity information is shared between internal
gateways

187

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 234
Identity Awareness

Deployment

Wireless campus
Deploy Identity Awareness enabled gateway inline in front of
wireless switch
Provide an identity awareness policy and inspect traffic that
comes form WLAN users
Guest access can be given by authenticating with Captive
Portal

187

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 235
Identity Awareness

Lab Practice

Lab 9: Identity Awareness

188

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 236
Identity Awareness

Review Questions

1. Identity Awareness lets you configure network access


based on what?

188

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 237
Identity Awareness

Review Questions

1. Identity Awareness lets you configure network access


based on what?
Network location
Identity of a user.
Identity of a machine

188

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 238
Identity Awareness

Review Questions

2. Browser-based Authentication lets you acquire identities


from?

188

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 239
Identity Awareness

Review Questions

2. Browser-based Authentication lets you acquire identities


from?
unidentified users, such as managed users connecting to the
network from unknown devices, and guests, such as partners or
contractors

188

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 240
Identity Awareness

Review Questions

3. What are two types of Identity Agents?

188

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 241
Identity Awareness

Review Questions

3. What are two types of Identity Agents?


Endpoint Identity Agent
Terminal Servers Identity Agent

188

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 242
Introduction to Check Point VPNs

189

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 243
Introduction to Check Point VPNs

Learning Objectives

Configure a pre-shared secret site-to-site


VPN with partner sites.
Configure permanent tunnels for remote
access to corporate resources.
Configure VPN tunnel sharing, given the
difference between host-based, subnet-
based and gateway-based tunnels.

190

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 244
Introduction to Check Point VPNs

The Check Point VPN

191

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 245
Introduction to Check Point VPNs

The VPN

VPN encrypted tunnels to exchange data


Uses IKE and IPSec protocols
IKE creates the tunnel
IPSec encodes the data

191-192

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 246
Introduction to Check Point VPNs

Site-to-Site VPN

Strong encryption
Reliable
Scalable

192

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 247
Introduction to Check Point VPNs

Remote-Access VPN

Strong
authentication

Centralized
Management

Scalable

193

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 248
Introduction to Check Point VPNs

VPN Implementation

194

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 249
Introduction to Check Point VPNs

Understanding VPN Deployment

Check Point VPN management model


Administrators directly define a VPN on group of Gateways
Gateway in group = VPN site
Each VPN site performs encryption for VPN Domain, LAN, Networks
Grouped VPN sites = VPN Community

195

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 250
Introduction to Check Point VPNs

VPN Communities

VPN Community
member VPN
VPN Site
Domain
VPN Domain
VPN site VPN
Community
VPN
VPN Community Members

VPN Tunnel
Domain-based VPN
Route-based VPN
195-196

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 251
Introduction to Check Point VPNs

Remote Access Community

Specifically for remote users


Secures communication between users and corporate LAN

197

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 252
Introduction to Check Point VPNs

Meshed VPN Community

198

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 253
Introduction to Check Point VPNs

Star VPN Community

199

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 254
Introduction to Check Point VPNs

Choosing A Topology

Meshed Community Star Community


Appropriate for Intranet Appropriate for exchange with
Participating Gateways part external partners
of internally managed Central and satellite
network Gateways

199-200

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 255
Introduction to Check Point VPNs

Combination VPN

200

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 256
Introduction Check Point VPNs

Topology and Encryption Issues

201

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 257
Introduction Check Point VPNs

Special VPN Gateway Conditions

202

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 258
Introduction Check Point VPNs

Special VPN Gateway Conditions

203

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 259
Introduction to Check Point VPNs

Authentication Between Community Members

Before exchanging keys and building tunnels, Gateways must


authenticate one of two ways.
Certificates
Pre-shared secret

203

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 260
Introduction to Check Point VPNs

Domain and Route-Based VPNs

Two ways to direct VPN traffic:


Domain-based VPN
Route-based VPN

204

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 261
Introduction to Check Point VPNs

Access Control and VPN Communities

205

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 262
Introduction to Check Point VPNs

Access Control and VPN Communities

Using the VPN column of the Rule Base, you can create access
control rules that apply only to members of a VPN community:

205

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 263
Introduction to Check Point VPNs

Access Control and VPN Communities

You can also create rules that are relevant for both VPN Communities
and host machines not in the Community:

205

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 264
Introduction to Check Point VPNs

Access Control and VPN Communities

205

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 265
Introduction to Check Point VPNs

Accepting All Encrypted Traffic

206

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 266
Introduction to Check Point VPNs

Special Considerations for Planning a VPN Topology

1. Who needs secure/private access?


2. From as VPN point of view, what will be the organization structure?
3. How will externally managed Gateways authenticate?

207

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 267
Introduction to Check Point VPNs

Integrating VPNs into a Rule Base

Simplified Mode Rule Base

208

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 268
Introduction to Check Point VPNs

Simplified vs. Traditional Mode VPNs

Simplified Mode Traditional Mode


Simpler Maintain existing VPN
Less error-prone definitions
More secure
Easier to understand
New VPN features

209

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 269
Introduction to Check Point VPNs

VPN Tunnel Management

VPN Tunnel
Authenticity
Privacy
Integrity

Types and number of tunnels:


Permanent Tunnels
VPN Tunnel Sharing

209

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 270
Introduction to Check Point VPNs

Permanent Tunnels

Configuration of permanent tunnels on Community level:


Can be specified for an entire community
Can be specified for a specific Gateway
Can be specified for a single VPN tunnel

210-211

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 271
Introduction to Check Point VPNs

Tunnel Testing for Permanent Tunnels

Testing to see if VPN tunnels are active:


1. Test
2. Reply
3. Connect
4. Connected

210

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 272
Introduction to Check Point VPNs

VPN Tunnel Sharing

Control number of tunnels:


One per each host
One per subnet pair
One per Gateway pair

211

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 273
Introduction to Check Point VPNs

Remote Access VPNs

SecuRemote
SecureClient
SecureClient Mobile
L2TP

213

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 274
Introduction to Check Point VPNs

Multiple Remote Access VPN Connectivity Modes

IPsec Software Blade modes for connectivity and


routing issues
Office Mode
Visitor Mode
Hub Mode

214

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 275
Introduction to Check Point VPNs

Establishing a Connection Between a Remote User


and a Gateway

214-215

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 276
Introduction to Check Point VPNs

Lab Practice

Lab 10: Site-to-Site VPN Between Corporate and


Branch Office (Certificate)

216

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 277
Introduction to Check Point VPNs

Review Questions

1. What is a VPN Community?

216

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 278
Introduction to Check Point VPNs

Review Questions

1. What is a VPN Community?


A collection of VPN enabled Gateways capable of communication
via VPN tunnels.

216

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 279
Introduction to Check Point VPNs

Review Questions

2. What is a meshed VPN Community?

216

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 280
Introduction to Check Point VPNs

Review Questions

2. What is a meshed VPN Community?


A VPN Community in which a VPN site can create a VPN tunnel
with any other VPN site within the community.

216

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 281
Introduction to Check Point VPNs

Review Questions

3. Which is the preferred means of authentication between


VPN Community members, and why?

216

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 282
Introduction to Check Point VPNs

Review Questions

3. Which is the preferred means of authentication between


VPN Community members, and why?
Certificates, because they are more secure than pre-shared
secrets.

216

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 283
Introduction to Check Point VPNs

Review Questions

4. When planning a VPN topology, what questions should be


asked?

216

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 284
Introduction to Check Point VPNs

Review Questions

4. When planning a VPN topology, what questions should be


asked?
Who needs secure/private access?
From the point of view of the VPN, what will be the structure of the
organization?
How will externally managed Gateways authenticate?

216

2013 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties | 285

Das könnte Ihnen auch gefallen