Workflow for Setting Up a Security Gateway in Alibaba Cloud
Step 1: Preparing Your Alibaba Account
To prepare your Alibaba Cloud account, do the following:
-
If you do not already have an Alibaba Cloud account, create one at Alibaba Cloud Platform.
-
Navigate to ECS console using the menu bar.
-
In Network & Security, click SSH Key Pairs.
-
Use the region selector in the navigation bar to choose the Alibaba Cloud region, where you want to deploy Check Point Cloud Firewall Gateway .
-
Create a key pair in your preferred region.
-
If necessary, request a service limit increase for the Alibaba Cloud resources you are going to use.
You may have to do this, if you have an existing deployment that uses the Alibaba Cloud resources below, and you may exceed the default limit with this deployment.
The resources that may need a service limit increase are:
-
Number of On-demand ECS instances.
-
Number of Elastic IP addresses.
-
Number of VPCs for each region.
-
Number of VPN connections for each region.
-
VPN connections for each VPC.
-
By default, this Deployment guide uses ec5.xlarge for the Security Gateways and ecs.hfg6.xlarge for the Security Management Server
Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server..
Step 2: Deploy with a Terraform template in Alibaba Cloud
How to run Terraform:
|
|
Notes -
|
-
Open the terraform.tfvars file and fill all relevant input parameters.
You may need to prepare some manual preparation in the Alibaba Cloud Console (VPC, vSwitches, SSH key etc.).
-
Open command line in the module's directory and Initialize the module. Run:
terraform init -
See the terraform plan to be executed:
terraform plan -
Apply - Execute the module deployment plan (shows the plan again and prompts the user to type 'yes' to continue with execution). Run:
terraform apply
Note - In the Readme there may be instructions to run a different
applycommand (e.g. in thegateway-master TF). -
Destroy your module deployment (Delete environment):
terraform destroy
Step 3: Deploy the Cloud Firewall Gateway in Alibaba Cloud:
|
Terraform Template |
Description |
Link |
|---|---|---|
|
The template deploys:
|
Cloud Firewall Gateway for Alibaba cloud into a new VPC | |
|
Security Gateway into an existing VPC |
The template deploys:
|
Cloud Firewall Gateway for Alibaba cloud into an existing VPC |
Step 4: Deploying the Check Point Security Management Server
Use one of the options below to deploy the Check Point Security Management Server
Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server..
-
Use the existing on-premises Security Management Server, or existing Security Management Server in Alibaba Cloud Platform.
If the Security Management Server is communicating over a private IP addresses with the Cloud Firewall Gateway, then make sure that the Security Management Server has connection to the Security VPC where they are deployed.
-
Deploy a new Security Management Server with the Management Terraform template.
|
Terraform Template |
Description |
Link |
|---|---|---|
|
Security Management Server into a new VPC |
The template deploys:
|
Creates a new VPC and deploys a Management Gateway into it. |
|
Security Management Server into an existing VPC |
The template deploys:
|
Deploys a Security Management into an existing VPC. |
|
|
Note - For direct access to the Cloud Firewall Security Gateway, deploy the Management in the same Security VPC where you deployed the Gateway in step 3. |
To configure the Check Point Security Management Server, follow the steps in R81 Quantum Security Management Administration Guide.
Step 5: Set Up Routes on Security Gateway to the Internal vSwitches
To set up route on the Security Gateway to the internal vSwitches:
-
Connect over SSH to the Security Gateway
-
Log in to Gaia Clish
The name of the default command line shell in Check Point Gaia operating system. This is a restricted shell (role-based administration controls the number of commands available in the shell)., or Expert mode. -
Add this route:
-
In Gaia
Check Point security operating system that combines the strengths of both SecurePlatform and IPSO operating systems. Clish, run these two commands:set static-route <VPC-IP-address/Prefix> nexthop gatewayaddress <eth1-router-IP-address> onsave config -
In Expert mode, run this command:
clish -c 'set static-route <VPC-IP-address/Prefix>nexthop gateway address <eth1-router-IP-address> on' -s
Example:
set static-route 10.0.0.0/16 nexthop gateway address 10.0.2.253 on -
Parameters:
|
Parameter |
Description |
|---|---|
|
<vpc-IP-address/Prefix> |
Specifies the prefix of the entire VPC. Example: 10.0.0.0/16 |
|
<eth1-router-IP-address> |
Specifies the unicast IP address on the subnet, to which the eth1 is connected. Example: 10.0.2.253 |
|
|
Note - If the VPC comprises several non-contiguous address prefixes, repeat the command for each prefix. |
Step 6: Configure Cloud Firewall Gateway in SmartConsole
To enforce a Security Policy
Collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection., the Cloud Firewall Gateway must first be configured on the Security Management Server using Check Point's SmartConsole
Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on..
Configuring the Gateway Object
-
Use SmartConsole to connect to your Check Point Security Management Server.
-
If the Security Management Server and the Security Gateway have to communicate through public IP addresses, make sure that the Security Management Server object is defined with the elastic IP address.
Edit the Security Management Server object and change the IP address.
Important - If you change the main IP address of the Security Management Server, you must issue and install the license(s) for the new IP address.
-
Create the Security Gateway:
In the top of the SmartConsole, click
> More > Network Object > Gateway And Servers > Gateway > Classic Mode. -
Define the gateway's general properties:
-
In the Gateway Name field, enter a name for the gateway object (as in "
Alibaba_GW"). -
In the IPv4 address field:
If you manage the gateway from the same VPC, enter the Gateway private IP address. Otherwise, enter the Gateway public IP address.
-
Click Communication.
-
In the One-Time Password field, enter the SIC
Secure Internal Communication. The Check Point proprietary mechanism with which Check Point computers that run Check Point software authenticate each other over SSL, for secure communication. This authentication is based on the certificates issued by the ICA on a Check Point Management Server. key you set up in the Terraform Template. -
In the One-Time Password field, enter the SIC key again.
-
Click Initialize.
-
If the One-time-password is confirmed, the Trust State field shows Trust Established.
-
-
To close the Communication properties window, click Close.
If the Activation Key is confirmed, the Trust State field shows Trust Established.
-
Click OK.
-
-
Click Network Management > Get Interfaces > Get Interfaces With Topology.
If this warning appears:
"Topology and Anti-Spoofing settings that are already defined will be overwritten. By results of this operation that contradict them, if any. Do you want to continue?"
Click Yes.
From the Network eth0 and eth1 window, click Topology and disable Anti-Spoofing.
-
Verify the settings:
-
To close the window, click OK.
-
Install policy on the Security Gateway.
-
To Allow Outbound Traffic
-
Use SmartConsole to connect to your Check Point Security Management Server.
-
Create an Internal Network
Computers and resources protected by the Firewall and accessed by authenticated users. for the Security VPC:In the right navigation bar, click new > Network….
-
Configure Network general properties:
-
Enter a name for your network (such as Security_network).
-
In the IPv4 section, insert the Network Address and the Net mask of the Security VPC
-
-
Create a NAT rule
Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause specified actions to be taken for a communication session. for the network to hide behind the Security Gateways:-
In the Network's object left pane, click NAT.
-
Check the box: Add automatic address translation rules.
-
Leave the configuration as default:
-
Translation method: Hide
-
-
Hide behind the gateway
-
-
Verify the settings:
-
To close the window, click OK.
-
Install policy.
-
-
Add a custom route table for the new vSwitch
A software abstraction of a physical Ethernet switch. It can connect to physical switches through physical network adapters to join virtual networks with physical networks. It can also be a Distributed Virtual Switch (dvSwitch), for definition and use on multiple ESXi hosts. you created:-
Go to AliCloud ECS console, Route tables > Create Route Table.
-
Select the VPC of the relevant vSwitch
-
Enter a name and click OK.
-
Select the route table you created > Custom route > Add Route Entry.
-
Set Destination CIDR to 0.0.0.0/0.
-
Set the next hop to ENI > select the Gateway's internal interface (eth1).
-
Go to Associated vSwitch tab > click Associated vSwitch > Select the peer vSwitch.
-
Click OK.
-
Step 7: Configure VPN
In SmartConsole, create a Network Group object to represent the encryption domain for the Security Gateway.
-
Create a Network Group object to represent the encryption domain of the gateway:
-
In SmartConsole, click the Objects menu > Object Explorer.
-
From the top toolbar, click New > Network Group.
-
In the Enter Object Name field, enter the desired name.
-
Click the + icon and select the applicable network objects.
-
Click OK.
-
Close the Object Explorer.
-
-
Edit the Gateway object:
-
In SmartConsole, from the left navigation panel, click Gateways & Servers.
-
Double-click the Security Gateway object.
The Gateway Properties window shows.
-
On the General Properties pane, check the IPSec VPN box.
-
-
Define your Network Group as the encryption domain of the Security Gateway object:
-
In SmartConsole, from the left navigation panel, click Gateways & Servers.
-
Double-click the Security Gateway object.
The Gateway Properties window shows.
-
In the gateway object left tree, click Network Management > VPN Domain.
-
Select manually defined.
-
In the right corner of this field, click the [...] button and select the Network Group object you created in Step 1.
-
-
Define the VPN community:
-
In the Security Gateway object left tree, click IPsec VPN.
-
In the section This Security Gateway participates in the following VPN Communities, select the applicable VPN community.
-
-
Define the outgoing VPN interface:
-
In the Security Gateway object left tree, click IPsec VPN > Link Selection.
-
In the IP Selection by Remote Peer section, select Always use this IP address > Statically NATed IP, and then enter the gateway public IP address.
-
In the Outgoing Route Selection section:
-
Click Source IP address settings.
-
Select Automatic (derived from method of IP selection by remote peer).
-
Click OK.
-
-
In the Tracking section, select the desired option.
-
Click OK to close theSecurity Gateway Properties window.
-
-
Configure the VPN Community to use Permanent Tunnels:
-
In SmartConsole, click the Objects menu > Object Explorer.
-
In the left tree, clear all boxes except for VPN Communities.
-
Double-click the VPN community, in which this gateway object participates.
The VPN Community window shows.
-
In the left tree, click Tunnel Management.
-
Select Set Permanent Tunnels.
-
Select the applicable option.
-
Click OK to close the VPN Community properties window.
-
Close the Object Explorer.
-
-
Install the applicable Access Control Policy on the gateway object.
Testing and Troubleshooting
Security Gateway
-
In AliCloud ECS console, go to the instance and check system log is finished successfully (machine is ready to be logged in):
Expected output:
This system is for authorized use only.
login -
Connect VIA SSH using configured SSH key / Password
-
Check user-data script finished successfully by running in Expert mode:
cat /var/log/alicloud-user-data.logExpected output:
Finished user data -
Check both interfaces are configured correctly.
-
In the SmartConsole, check Device & License Information for problems.
-