Installing the CloudGuard Network Security Gateway

Note - Starting from R81.20 Take 99, the Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. can be upgraded using Jumbo Hotfix AccumulatorClosed Collection of hotfixes combined into a single package. Acronyms: JHA, JHF, JHFA. (in-place upgrade).

To upgrade or install the CloudGuard Network Gateway for NSX-T, open these connections:

Make sure you have the latest build of the CPUSEClosed Check Point Upgrade Service Engine for Gaia Operating System. With CPUSE, you can automatically update Check Point products for the Gaia OS, and the Gaia OS itself. Deployment Agent. After you install CloudGuard Network, continue with Step 2.

Use the steps below as a guide for your system:

Step Description

1

Install the CloudGuard Network Service Registration HotfixClosed Software package installed on top of the current software version to fix a wrong or undesired behavior, and to add a new behavior. on the Management ServerClosed Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server..

See Step 1: Installing the CME Bundle on the Management Server.

2

Configure the VMware components.

See Step 2: Configuring the NSX-T Components.

3

Provide the OVF URL path.

See Step 3: Providing the URL OVF Path.

4

Configure the CloudGuard Network Management Server Properties.

See Step 4: Configuring the Management Server.

5

Register the CloudGuard Network Gateway Service.

See Step 5: Registering a New CloudGuard Network Gateway Service.

6

Deploy and Configure CloudGuard Security Gateway for NSX.

See Step 6: Deploying and Configuring CloudGuard Network Security Gateway for NSX.

Step 1: Installing the CME Bundle on the Management Server

The Cloud Management Extension (CME) is a utility that runs on Check Point Security Management Servers and Multi-Domain Security Management Servers.

CME can be installed on Security Management Servers and Multi-Domain Security Management Servers deployed in cloud platforms or on-premises.

Important - To keep CME up-to-date with Automatic Updates. To get CME with Automatic Updates, remove any CME manual installation made through CPUSE and refer to sk157492.

To install the CME utility:

  1. Go to sk157492.

  2. Download the latest CME package for your Management Server version.

  3. Follow the Installation Instructions in the SK article.

Step 2: Configuring the NSX-T Components

Before you start these procedures, install and configure the required VMware component. You can install more than one ESXi.

Preparing the ESXi Cluster for CloudGuard Network Service Deployment

CloudGuard Network services deployed on hosts provide granular control over East-West network traffic.

The services allow guest VM traffic to flow through the security implementation without changing the original topology.

To prepare hosts to participate in NSX-T, you must install NSX-T kernel modules on ESXi hosts.

This allows you to build the NSX-T control-plane and management-plane fabric.

NSX-T kernel modules packaged in VIB files run in the hypervisor kernel and provide services such as distributed routing, distributed firewall and bridging capabilities.

Notes:

NSX NSGroup Objects

With the Grouping feature, you can create custom containers and assign resources, such as virtual machines and network adapters for CloudGuard service protection.

After a group is defined, you can add the group as source or destination to a redirection ruleClosed Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause specified actions to be taken for a communication session..

Note - You can include other NSGroups in your new NSGroup.

Creating a CloudGuard Network Gateway IP Address Pool

Step 3: Providing the URL OVF Path

Install the OVF files to configure the Security Gateway.

Notes:

  • For each service, you can use a different OVF file.

  • After you download the OVF file, put the files on an HTTP server only.

  • Do not change the downloaded OVF file name.

Step 4: Configuring the Management Server

Configuring the CloudGuard Network Management Server Properties

Log in with SSH to the Management Server in Expert ModeClosed The name of the elevated command line shell that gives full system root permissions in the Check Point Gaia operating system. and run the command:

cme_menu

Configure the CloudGuard Network Management Server properties.

The controller is the NSX-T manager.

Before you can create new service, it is necessary to add the controller (NSX-T manager) to your environment.

Step 5: Registering a New CloudGuard Network Gateway Service

Log in with SSH to the Management Server in Expert Mode and run:

cme_menu

After you created the controller, you can now register the new service.

Failure Policy

Failure Policy in East-West Services:

The failure policy for East-West services is determined while redirecting the traffic to the service from the

NSX-T manger web Client. You can change it in the NSX-T web client.

Failure Policy in North-South Services:

The failure policy for North-South services is determined when you deploy the service from the NSX-T manger web Client.

Important - After installation, you cannot change the failure policy.

Automatic Provisioning of CloudGuard Network Objects (East-West Only)

In East-West deployment, Automatic ProvisioningClosed Check Point Software Blade on a Management Server that manages large-scale deployments of Check Point Security Gateways using configuration profiles. Synonyms: SmartProvisioning, SmartLSM, Large-Scale Management, LSM. handles these actions on CloudGuard Network objects:

To see the current Automatic Provisioning status:

service cme status

To enable Automatic Provisioning:

After you create a new controller the service auto-provision starts automatically.

To disable Automatic Provisioning:

service cme stop

Uninstalling the CloudGuard Network Gateway

Important - Do not use this procedure to upgrade the CloudGuard Network Service Registration Hotfix.

Uninstall the CloudGuard Network Gateway service before you uninstall CloudGuard Network from the CloudGuard Network Management Server.

Automatic Provisioning in SmartConsole

  • If you did not enable Automatic Provisioning, delete the gateway manually.

  • If you did enable Automatic Provisioning, wait for the objects to be deleted from SmartConsole.

Management High Availability Failover

Failover from an Active Management Server (Security Management ServerClosed Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server. or Multi-Domain Server) to the Standby Management Server is done manually.

You must manually synchronize the Management Servers before and after failover.

To learn more, see the Quantum Security Management Administration Guide for your version > the section "Synchronization Procedures".

Note - In a Multi-Domain Server environment, synchronize only the Domain Management Server that you changed to Active. It is necessary to do this for every Domain Management Server that was changed to Active.

To learn more about failover, see the Quantum Security Management Administration Guide for your version > the section "Changing a Server to Active or Standby".

Best Practice - In a Management High Availability environment, store the CloudGuard OVF files on a third-party web server.

Step 6: Deploying and Configuring CloudGuard Network Security Gateway for NSX

Check Point CloudGuard Network Gateway enforces adaptive security across virtual environments. It applies advanced Threat Prevention to block threats inside the Data Center, and micro-segmentation for access control inside the virtual environment.

Deploying a CloudGuard Network Gateway

After you complete the service registration (see Step 5: Registering a New CloudGuard Network Gateway Service), you can deploy the CloudGuard Network Gateway with the vSphere Web Client.

Before you begin:

Cluster interfaces configuration:

On the deployment of the OVF template, these interfaces are configured:

  • eth0 - The Management interface.

  • eth1 and eth2 - The bridge interfaces (ingress and egress respectively).

  • eth3 - Can operate as the High Availability sync interface.

    When you use High Availability deployment mode, you must set the IP Addresses for eth3 (Sync Interface) of each node.

In Smart Console:

  1. Configure IP address for eth3 (sync interface).

  2. Set eth0 type: Cluster , eth3 type: primary sync.

    For example:

  3. Disable anti-spoofing on the Cluster members.

  4. Reboot the Cluster members.

Configuring NSX to Redirect Traffic to the CloudGuard Network Gateway

This procedure describes basic steps to configure the redirection rules. See Creating Redirection Rules.

For more information, see the VMware documentation for conceptual information, detailed procedures, and explanations of the different objects and options.

After you successfully deployed a service in your environment, for the traffic to be inspected by the deployed service (Check Point Gateway), it is necessary to enable the redirection rules.

Note - IPv6 is currently not supported for CloudGuard Network Gateway for NSX-T 2.4.x. Make sure to not redirect IPv6 traffic to the CloudGuard Network Gateway.

Configuring Traffic Redirection in East-West

Configuring Traffic Redirection in North-South

Note - You must allow BFD packets to pass through the Security Gateway for correct functionality of North/South traffic redirection.

Add a rule allowing BFD packets to the Security Management policy.

Manually Creating CloudGuard Network Objects in SmartConsole

This procedure is not necessary if you use East-West and already enabled Automatic Provisioning of CloudGuard Network objects.

Note - Before you add a CloudGuard Network Gateway instance to the CloudGuard Network cluster, make sure that you coordinate the Date, Time and Time Zone settings between the Security Management Server and the CloudGuard Network Gateway.

Multi-Tenancy Support

CloudGuard Network supports multi-tenant protection on ESXi.

This means it can protect multiple customers or organizations as well as departments or business units that share the same ESXi cluster.

Configuring Identity Awareness in SmartConsole

Configure CloudGuard Network to use Identity Awareness to see Security Group details in the CloudGuard Network logs.

Configuring the Anti-Virus Policy in SmartConsole

To use the Anti-VirusClosed Check Point Software Blade on a Security Gateway that uses real-time virus signatures and anomaly-based protections from ThreatCloud to detect and block malware at the Security Gateway before users are affected. Acronym: AV. Software Blade in CloudGuard Network for NSX, create a new Threat Prevention profile (this is the profile that you used in the Threat Prevention Policy).

Configuring HTTPS Inspection

To use the HTTPS Inspection Blade in CloudGuard Network for NSX, see the Threat Prevention Administration Guide for your version > Chapter "HTTPS Inspection".

Notes:

  • To create redirection rules for HTTPS Inspection, see the steps in Creating Redirection Rules. Make sure the DFW policy is not Stateful.

  • NSX-T design does not let you to configure HTTPS Inspection for VMs in the same Security Group.

Advanced Configuration

For the advanced configuration, use the autoprov_cfg utility.

See the "Using the autoprov_cfg Command Line Configuration utility" section in the Cloud Management Extension Administration Guide.