Configuration Steps

Step 1 Create an Azure AD and Service Principal

With the Azure AD and Service Principal, the Check Point Security Management Server monitors the creation and status of the VMSS, so it can complete the provision of these gateways.

  1. Connect to portal.azure.com.

  2. Click Active Directory -> App registrations -> New registration.

  3. Create new registration:

    1. Select a meaningful Name.

    2. Supported account types - Select Single tenant.

    3. Redirect URL - Select Web, and type https://localhost/vmss-name - instead of: vmss-name. It can be any name.

    4. Click Register.

    5. Open Certificates and secrets pane -> click New secret key.

    6. Add the duration for the key.

    7. Backup the key. You cannot look at the key later. Save it now.

After you create the application, write down these values, for "Configure the Check Point Security Management Server"

  • Application ID

    client_id

  • Key value

    client_secret

  • Tenant ID

    tenant

  • Directory ID

Note - We recommend that you set the key to never expire.

Step 2 Install the Check Point Security Management Server

These steps are required only if you do not have an installed Check Point Security Management Server.

If you already have the Check Point Security Management Server installed, skip to Step 3.

Step 3: (Optional) Deploy the Azure App Service Domain and Assign the Azure AD Application

This step is optional and is only required for Remote Access VPN configuration.

The App Service Domain (DNS Zone) is used to store the Record Set with the VMSS Instances' public IPs. Remote Access VPN clients run a DNS query to the Record Set FQDN to resolve the current active IP addresses and do a load-share mechanism on the resolved IP list.

Deploy the Azure App Service Domain from the Azure Portal.

Notes:

  • Skip this step if you already have an existing Azure App Service Domain to use for the Remote Access solution.

  • To use an existing domain name registrar, it must be delegated to the Azure DNS Zone. For more information, see the Microsoft Azure documentation.

Use these parameters when deploying a DNS Zone resource in Azure:

Parameter Description

Search for domain

The domain name that you want to buy and validate its availability.

Subscription

The Azure subscription where the App Service Domain is deployed.

Resource group

The Azure Resource Group where the App Service Domain is deployed.

Contact information

The Domain registration information.

Privacy protection

Accept terms and purchase.

Step 4: Configure the Check Point Security Management Server

Do these steps to manage the Virtual Machine Scale Sets with the Check Point Security Management Server:

  1. Downloading and Installing the Latest CME (Cloud Management Extension) Version of CME.

  2. Configuring the Cloud Management Extension (CME) on the Security Management Server

  3. Configure the Security Policy in SmartConsole.

    Important - The name of the policy has to match correctly the value that you configured in "Install the Check Point Security Management Server".

Note - By default, each Check Point Security Gateway and Security Management Server's Gaia Portal is accessible from the internet by browsing to http://<virtual-machine-public-ip>. Restriction of access to the Gaia Portal is possible by configuring a Network Security Group, or by configuring the Check Point Security Gateway and Management Server settings.

If Remote Access VPN is used, do these steps:

Remote Access – part 1

  1. Configure the Management Server to centrally manage Endpoint Client's settings. Do steps 1-4 in sk55502 (Note - Skip step 5).

  2. Edit the trac_client_1.ttm file on the Management Server:

    1. Connect to the command line on the Security Management Server / Multi-Domain Security Management Server.

    2. Log in to the Expert mode.

    3. On the Multi-Domain Server, switch to the context of the applicable Domain Management Server:

      mdsenv <Name or IP address of Domain Management Server>

    4. Edit the trac_client_1.ttm file:

      1. Run:

        vi $FWDIR/conf/trac_client_1.ttm

      2. Set the default value of the "automatic_mep_topology" attribute to false.

      3. To disable "SecondaryConnect", add this section in the file:

        :enable_secondary_connect (

            :gateway (
                :map (
                   :true (true)
                   :false (false)
                   :client_decide (client_decide)
                )
                :default (false)
            )
        )

Note - If this section already exists, change the "default" value to (false).

Remote Access – part 2

Do these steps in SmartConsole:

  1. Open Global Properties.

  2. Click the Remote Access tab.

  3. Click Endpoint Connect.

  4. Set the Connect Mode to Always Connected.

  5. Set the Disconnect when connectivity to network is lost to yes.

  6. Create a Network object to represent the VMSS Gateway's frontend subnet:

    Example: eth0: 10.10.1.1 -> Network: 10.10.1.0/24

    1. Select the Objects menu > New Network.

    2. Enter a descriptive name. For example, FrontEndNetwork.

    3. From the left tree, click General.

    4. Enter the applicable information.

    5. Click OK.

  7. In Security Policies > Access Control, click NAT and add a Manual NAT rule to skip NAT for outbound traffic:

    Original Source

    Original Destination

    Original Services

    Translated Source

    Translated Destination

    Translated Services

    Install On

    A Network Group object that represents the full external Gateway's address space

    Any

    Any

    = Original

    = Original

    = Original

    Policy Targets

Remote Access – part 3, Add "Server Authentication" to the Extended Key Usage (EKU) of the GW IKE Certificate

  1. If the Management or Multi-Domain Management Server is deployed in Azure, add the security rule that allows TCP access to port 18265 for Management network interface to the network security group.

  2. Set up the ICA Management Tool, see sk30501.

  3. Access the ICA Management Tool, at this URL:

    https://<Management_Machine_IP_Address>:18265

  4. Click Configure the CA.

  5. Below the IKE Certificate extended key usage, select Server Authentication > click Apply.

  6. Disable the ICA management tool. On the Management Server, in Expert mode run:

    cpca_client set_mgmt_tool off

  7. If the Security Management Server or Multi-Domain Server is deployed in Azure, remove the security rule that allows TCP access to the port 18265 for Management network interface from the network security group.

Step 5: Deploy the Check Point VMSS and Assign the Azure AD Application

Deploy the CloudGuard Network Security - Firewall & Threat Prevention from the Azure Marketplace.

Contact Check Point Support or Check Point Local Office for the solution template to deploy a VMSS with Remote Access VPN.

Note - If Multi Region Remote Access VPN is used, do this step again to deploy VMSS in different regions.

  1. Assign the Azure Active Directory application as described in Add a minimum role of Reader to the VMSS and the VNET. See Assign application to role.

  2. If you use Remote Access VPN, do these steps:

    1. Assign the Azure AD application as described in Step 1 Create an Azure AD and Service Principal. Add a minimum role of Reader to the VNET and the role of Contributor to the VMSS.

    2. Assign System Assigned Managed Identity application is created as part of the VMSS deployment. Add a minimum role of Contributor to the Resource Group of the App Service DNS (DNS Zone). The name of the System Assigned Managed Identity is equal to the VMSS Resource Group one.

For more about Managed identities, see the Azure documentation overview.

Notes:

  • Newly provisioned Security Gateways automatically receive the latest published Security Policy. You have to install the policy on the existing Security Gateways to update their Security Policy.

  • Auto Scaling Security Gateway objects are automatically created and deleted according to the current environment. Therefore, we do not recommend that you use specified objects in rules. In additions, we do not recommend that you manually edit those objects.

  • In case of scale out event, the latest released Check Point image is used to deploy the new Virtual Machine.

  • As part of Remote Access VPN deployment, the Azure function (or "Function App") is deployed. The Azure function is triggered in two minute intervals to get VMSS provisioned instances and add their public IPs to the DNS Zone Record Set.

  • When you use the template version 20181017 or above:

      1. Fast Deployment Images (Blink) with a pre-installed Jumbo Hotfix Accumulator is used.

      2. In case of scale out event, the newer Virtual Machine uses the latest released Check Point image.

        For R80.10, the latest release image might include a newer Jumbo Hotfix Accumulator version.

    For more information, see these SK articles:

  • By default, each Check Point Security Gateway and Security Management Server's Gaia Portal is accessible from the internet at https://<virtual-machine-public-ip>. It is possible to control the access to the Gaia Portal. Configure a Network Security Group, or configure the Check Point Gateway and Management Server settings.

Step 6: (Optional): Deploy External Application Gateway

Prerequisites:

  • A domain in your possession.

  • A subnet that can contains only the External Application Gateway in the VMSS's VNET.

To deploy an External Application Gateway:

From the Azure Portal, go to Application gateways > deploy a new Application Gateway.

To complete the HTTP settings creation, click Add.

To complete the Routing rule creation, click Add.

Review and create this Application Gateway.

Note – The Application Gateway deployment completes in about 20 minutes or less.

Important - The Health Probe checks the communication up to the application server. Hence, the Backend health tests passes only when the full solution is deployed and configured.

Edit the route table:

  1. Add a route from the VMSS Frontends subnet to the Application Gateway subnet.

  2. Go the external VMSS subnet by default named "VMSS-Frontend" > Routes > click Add.

    • Name: To-external-application-gateway

    • Address prefix: the address prefix of the external Application Gateway subnet

    • Next hop type: Virtual network

  3. Click OK.

Add a static route for the VMSS instances:

  1. Connect to the command line on the Security Management Server.

  2. Log in to the Expert mode.

  3. Download the static_route_config_sh script from this link.

  4. Edit static_route_config_sh and enter the EXTERNAL_AGW_SUBNET_CIDR and EXTERNAL_VMSS_SUBNET_DEFAULT_GATEWAY values.

  5. Copy the script to the Management Server, use this name:

    $MDS_FWDIR/conf/static_route_config_<CONFIGURATION-TEMPLATE-NAME>.sh

  6. Assign the execute permission to the shell script, run:

    chmod u+x $MDS_FWDIR/conf/static_route_config_<CONFIGURATION-TEMPLATE-NAME>.sh

  7. Make sure there are no syntax mistakes in the shell script, run:

    sh -n $MDS_FWDIR/conf/static_route_config_<CONFIGURATION-TEMPLATE-NAME>.sh

  8. Configure CME and set the relevant template to use this script, run:

    autoprov_cfg set template –tn <CONFIGURATION-TEMPLATE-NAME> –cg $MDS_FWDIR/conf/static_route_config_<CONFIGURATION-TEMPLATE-NAME>.sh

 

Step 7: (Optional): Deploy Internal Application Gateway

Prerequisite - A subnet that can contains only Internal Application Gateway in the VMSS's VNET. This subnet is different from the one created in step 6.

To deploy Internal Application Gateway:

From the Azure Portal, go to Application gateways > deploy a new Application Gateway.

To complete a Path-based routing rule, click Add. If it necessary, you can create more Path-based rules.

Review and create this Application Gateway.

Note – The Application Gateway deployment completes in about 20 minutes.

Cleanup

After the deployment of the Internal and External Application Gateways (steps 6 and 7), go to the VMSS resource group and delete the External Load Balancer object created automatically in step 5. The External Load Balancer is named by default: frontend-lb.

Note - For outbound inspection, use the Internal Load Balancer

Step 8: (Optional) Deploy the Azure Function Code

This step is optional and is only required for Remote Access VPN configuration.

Do this step to deploy the Azure Function code in the Azure Function Storage Account. The Azure Function responsibilities include: monitor the VMSS instances and update the DNS Record Set accordingly.

To deploy the Azure Function code:

Step Instructions

1

Download the Azure Function code from this link.

2

From the Azure portal, navigate to the VMSS Resource Group.

3

Click on the Function App storage account.

Note - The Azure Function App storage account name always starts with the azurefunction string.

4

In the storage account resource, click Containers > azure-function.

Azure documentation says this:

"When using Blob storage, you should use a private container with a Shared Access Signature (SAS) to enable the Functions runtime to access to the package".

For more information, see the Azure Function Documentation.

5

Upload the ZIP archive with Azure function code to the azure-function container.

6

Open the ZIP archive and navigate to the Generate SAS tab.

7

Change the SAS token expiry date/time > click Generate SAS token and URL.

Note - Make sure that the SAS token expiry date and time is configured correctly.

After the SAS token expires, the Azure Function stops its executions

8

Select and copy Blob SAS URL.

Note - The Blob SAS URL for the Azure Function code ZIP archive is accessible over the Internet.

9

Navigate back to the VMSS Resource Group > click the App Service (Function App) resource.

Note - The Azure Function App storage account name is always equal to the VMSS Resource Group name.

10

In the Function App resource, select Configuration > Application settings > click WEBSITE_RUN_FROM_PACKAGE.

11

Paste the SAS URL to the Value field.

Click OK.

12

In the Configuration view.

Click Save.

13

If you use Remote Access VPN multi-regional, go to the app service domain (DNS zone) you created and add a minimum role of read/write to the Function app.

Access control (IAM) > + Add > Add role assignment > choose the role assignment > go to Members > Managed identity > +Select members > choose your newly created Functions app > Review and assign.

Step 9: (Optional) Deploy the Traffic Manager Profile

This step is optional and is only required for Remote Access VPN Multi Region Configuration. Azure Traffic Manager is a DNS-based traffic Load Balancer that distribute traffic to the closest VMSS Scale Set services across global Azure regions, and at the same time provided High Availability and responsiveness.

For more information see Azure Documentation.

To deploy the Traffic Manager profile from the Azure portal use these parameters:

Parameter Description

Name

Enter a unique name for the Traffic Manager profile.

Routing Method

Select Geographic.

Subscription

Select the subscription that you want the Traffic Manager profile to apply to.

Resource group

The Azure Resource Group where the Traffic Manager profile is deployed.

Resource group location

The Azure Traffic Manager service is global and not bound to a location. But, you must specify a location for the resource group where the metadata associated with the Traffic Manager profile will reside. This location has no impact on the run time availability of your profile.

Step 10: (Optional) Set Up Traffic Manager External Endpoints

Note - For Remote Access VPN, Multi Region Configuration it is required.

Microsoft Azure Traffic Manager allows you to control how network traffic is distributed to VMSS that run in different regions.

When the Traffic Manager receives a DNS request, it selects an available endpoint in the closest region to return the DNS response.

To set up Traffic Manager External Endpoints:

Step Instructions

1

From the Azure portal, navigate to the Traffic Manager profile created in the step 7.

2

In the Traffic Manager profile, select Configuration and enter this information in the required information:

  • In the Protocol field, enter: HTTPS

  • In the Port field, enter: 443

3

In the Traffic Manager profile, select Endpoints, click Add and enter this information in the required field:

  • In the Type field, select External endpoint

  • In the Name field, enter the Endpoint's name

  • In the Fully-qualified domain name (FQDN) or IP field, enter a DNS Record Set FQDN that includes the VMSS Instances' public IP addresses.

    Note - DNS Record Set is used for one VMSS only.

  • In the Location field, select the geographic location from which the DNS Record Set FQDN defined in previous step will be accessible.

  • In the Health Checks field, select:

    • Enable: We recommend selecting this option: Health Checks determine if to send traffic to the Endpoint.

    • Always serve traffic: No Health Checks run. Traffic is always sent to the Endpoint.

4

After creating the Endpoint makes sure the Monitor Status is set to Online.

5

To create morel Endpoints with different DNS Record Sets, do steps 3 and 4 again.

Step 11: Set Up the External Load Balancer

By default, the template you deploy creates an external (Internet facing) Load Balancer that:

  • Listens on TCP port 80 on the static public IP address of the External Load Balancer.

  • Forwards the traffic it receives to the pool of Check Point CloudGuard Security Gateways on TCP port 8081.

  • Uses TCP health probes on port 8117 to know the health of the Check Point CloudGuard Network Security Gateways.

Notes:

  • You cannot use ports 80, 443, 444, 8082, 8117, and 8880 for forwarded traffic.

  • In addition, you cannot use the ports defined in sk52421 (used by Check Point software), and 32768 – 65535 as defined in sk162619 (FWD daemon listening on multiple random high ports).

  • Do not change the health probes.

  • The Check Point VMSS Resource Group includes a Network Security Group (NSG). By default, the NSG allows all outbound and inbound traffic.

You can configure the Load Balancer to listen on more ports and/or on more public IP addresses. See Load balancing with Multiple front-ends.

For use cases, see these links:

Step 12: Configure Inbound Protection

Note - If HTTPS Inspection is necessary, see Configuring HTTPS Inspection.

Step 13: Configure Outbound and East-West Protection

Configure UDR tables and NAT rules for Southbound-Northbound and East-West traffic protection. See the diagrams of the traffic flows.

You can configure the Check Point VMSS to examine Outbound and East-West traffic across internal subnets.

You can use this to examine and control traffic of different web clients such as

  • Servers and containers that must have software and image updates from repositories located outside the Virtual Network.

  • Virtual desktop environments that run in the Virtual Network and that access the Internet or each other.

  • Servers that send traffic to each other.

To configure inspection of the traffic from servers in internal private subnets, you have to route traffic through the Check Point VMSS. Use the Check Point Internal Load Balancer as the Next hop in the private subnet UDR. The Internal Load Balancer then forwards all the traffic to one of the Check Point Security Gateways.

Note - The Internal Load Balancer deploys by default as part of the solution template and is automatically configured. It is configured to listen and forward all TCP or UDP traffic on HA Ports. The Internal Load Balancer gets an automatically assigned name backend-lb. Probes monitor the health of the Check Point VMSS on the TCP port 8117 from source IP address 168.63.129.16.

Configuring Protection for the VMSS VNET

Note - The Internal Load Balancer private IP address is static. To find it, browse into the Internal Load Balancer named backend-lb.

For more information, see User Defined Routes.

Configuring Protection for External VNETs

Limitations:

This section is only supported when:

  • The template version is 20180711 or above.

  • The applicable peered VNETs use private address spaces as defined in the RFC 1918 (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16).

  • Global VNET peering is not supported. See Azure requirements and constraints.

Do these steps below for inspection of traffic between a subnet in the peered VNET, and a subnet in the VMSS VNET, or a different peered VNET.

Use case:

Your hub-spoke network topology uses peered VNETs and you want the VMSS, as the hub, to examine the traffic.

Step 14: (Optional) Configure and Deploy the Remote Access VPN Client

This step is optional and is only required for Remote Access VPN configuration.

Download the Endpoint Security VPN standalone package, or the Endpoint Security Managed client package.

For information on the client deployment and distribution options:

Notes:

  • When you create the VPN site on the client, it is important to configure the site's DNS name in the Server address or name. This is for the client to resolve the IP list and do a load share on the resolved IP list.

  • If Multi Region Remote Access VPN is used, it is required to configure a site's DNS name with a Traffic Manager Profile DNS name. The Traffic Manager Profile DNS name can be found in its Overview tab.

Best Practice - While the client moves between the site's Gateway (scale in and out events), we recommend to use the CAPI certificate for the user authentication method.