Workflow for Setting Up a Security Gateway in Alibaba Cloud
Step 1: Preparing Your Alibaba Account
To prepare your Alibaba Cloud account, do the following:
-
If you do not already have an Alibaba Cloud account, create one at Alibaba Cloud Platform.
-
Navigate to ECS console using the menu bar.
-
In Network & Security, click SSH Key Pairs.
-
Use the region selector in the navigation bar to choose the Alibaba Cloud region, where you want to deploy Check Point CloudGuard Network Security Gateway.
-
Create a key pair in your preferred region.
-
If necessary, request a service limit increase for the Alibaba Cloud resources you are going to use.
You may have to do this, if you have an existing deployment that uses the Alibaba Cloud resources below, and you may exceed the default limit with this deployment.
The resources that may need a service limit increase are:
-
Number of On-demand ECS instances.
-
Number of Elastic IP addresses.
-
Number of VPCs for each region.
-
Number of VPN connections for each region.
-
VPN connections for each VPC.
-
By default, this Deployment guide uses ec5.xlarge
for the Security Gateways and ecs.hfg6.xlarge
for the Security Management Server.
Step 2: Deploy with a Terraform template in Alibaba Cloud
How to run Terraform:
|
Notes -
|
-
Open the terraform.tfvars file and fill all relevant input parameters.
You may need to prepare some manual preparation in the Alibaba Cloud Console (VPC, vSwitches, SSH key etc.). -
Open command line in the module's directory and Initialize the module. Run:
terraform init
-
See the terraform plan to be executed:
terraform plan
-
Apply - Execute the module deployment plan (shows the plan again and prompts the user to type 'yes' to continue with execution). Run:
terraform apply
Note - In the Readme there may be instructions to run a different
apply
command (e.g. in thegateway-master TF
). -
Destroy your module deployment (Delete environment):
terraform destroy
Step 3: Deploy the CloudGuard Network Security Gateway in Alibaba Cloud:
Terraform Template |
Description |
Link |
---|---|---|
Security Gateway into a new VPC |
The template deploys:
|
CloudGuard Network Security Gateway for Alibaba cloud into a new VPC |
Security Gateway into an existing VPC |
The template deploys:
|
CloudGuard Network Security Gateway for Alibaba cloud into an existing VPC |
Step 4: Deploying the Check Point Security Management Server
Use one of the options below to deploy the Check Point Security Management Server.
-
Use the existing on-premises Security Management Server, or existing Security Management Server in Alibaba Cloud Platform.
If the Security Management Server is communicating over a private IP addresses with the CloudGuard Network Security Gateway, then make sure that the Security Management Server has connection to the Security VPC where they are deployed.
-
Deploy a new Security Management Server with the Management Terraform template.
Terraform Template |
Description |
Link |
---|---|---|
Security Management into a new VPC |
The template deploys:
|
Creates a new VPC and deploys a Management Gateway into it. |
Security Management into an existing VPC |
The template deploys:
|
Deploys a Security Management into an existing VPC. |
|
Note - For direct access to the CloudGuard Network Security Gateway, deploy the Management in the same Security VPC where you deployed the Gateway in step 3. |
To configure the Check Point Security Management Server, follow the steps in R81 Quantum Security Management Administration Guide.
Step 5: Set Up Routes on Security Gateway to the Internal vSwitches
To set up route on the Security Gateway to the internal vSwitches:
-
Connect over SSH to the Security Gateway
-
Log in to Gaia Clish, or Expert mode.
-
Add this route:
-
In Gaia Clish, run these two commands:
set static-route <VPC-IP-address/Prefix> nexthop gateway
address <eth1-router-IP-address> on
save config
-
In Expert mode, run this command:
clish -c 'set static-route <VPC-IP-address/Prefix>
nexthop gateway address <eth1-router-IP-address> on' -s
Example:
set static-route 10.0.0.0/16 nexthop gateway address 10.0.2.253 on
-
Parameters:
Parameter |
Description |
---|---|
<vpc-IP-address/Prefix> |
Specifies the prefix of the entire VPC. Example: 10.0.0.0/16 |
<eth1-router-IP-address> |
Specifies the unicast IP address on the subnet, to which the eth1 is connected. Example: 10.0.2.253 |
|
Note - If the VPC comprises several non-contiguous address prefixes, repeat the command for each prefix. |
Step 6: Configure CloudGuard Network Gateway in SmartConsole
To enforce a Security Policy, the CloudGuard Network Gateway must first be configured on the Security Management Server using Check Point's SmartConsole application.
Configuring the Gateway Object
-
Use SmartConsole to connect to your Check Point Security Management Server.
-
If the Security Management Server and the Security Gateway have to communicate through public IP addresses, make sure that the Security Management Server object is defined with the elastic IP address.
Edit the Security Management Server object and change the IP address.
Important - If you change the main IP address of the Security Management Server, you must issue and install the license(s) for the new IP address.
-
Create the Security Gateway:
In the top of the SmartConsole, click
> More > Network Object > Gateway And Servers > Gateway > Classic Mode.
-
Define the gateway's general properties:
-
In the Gateway Name field, enter a name for the gateway object (as in "
Alibaba_GW
"). -
In the IPv4 address field:
If you manage the gateway from the same VPC, enter the Gateway private IP address. Otherwise, enter the Gateway public IP address. -
Click Communication.
-
In the One-Time Password field, enter the SIC key you set up in the Terraform Template.
-
In the One-Time Password field, enter the SIC key again.
-
Click Initialize.
-
If the One-time-password is confirmed, the Trust State field shows Trust Established.
-
-
To close the Communication properties window, click Close.
If the Activation Key is confirmed, the Trust State field shows Trust Established. -
Click OK.
-
-
Click Network Management > Get Interfaces > Get Interfaces With Topology.
If this warning appears:
"Topology and Anti-Spoofing settings that are already defined will be overwritten. By results of this operation that contradict them, if any. Do you want to continue?"
Click Yes.
From the Network eth0 and eth1 window, click Topology and disable Anti-Spoofing.
-
Verify the settings:
-
To close the window, click OK.
-
Install policy on the Security Gateway.
-
To Allow Outbound Traffic
-
Use SmartConsole to connect to your Check Point Security Management Server.
-
Create an Internal Network for the Security VPC:
In the right navigation bar, click new > Network….
-
Configure Network general properties:
-
Enter a name for your network (such as Security_network).
-
In the IPv4 section, insert the Network Address and the Net mask of the Security VPC
-
-
Create a NAT rule for the network to hide behind the Security Gateways:
-
In the Network's object left pane, click NAT.
-
Check the box: Add automatic address translation rules.
-
Leave the configuration as default:
-
Translation method: Hide
-
-
Hide behind the gateway
-
-
Verify the settings:
-
To close the window, click OK.
-
Install policy.
-
-
Add a custom route table for the new vSwitch you created:
-
Go to AliCloud ECS console, Route tables > Create Route Table.
-
Select the VPC of the relevant vSwitch
-
Enter a name and click OK.
-
Select the route table you created > Custom route > Add Route Entry.
-
Set Destination CIDR to 0.0.0.0/0.
-
Set the next hop to ENI > select the Gateway's internal interface (eth1).
-
Go to Associated vSwitch tab > click Associated vSwitch > Select the peer vSwitch.
-
Click OK.
-
Step 7: Configure VPN
In SmartConsole, create a Network Group object to represent the encryption domain for the Security Gateway.
For more information, see the R81 Quantum Security Management Administration Guide.
-
Create a Network Group object to represent the encryption domain of the gateway:
-
In SmartConsole, click the Objects menu > Object Explorer.
-
From the top toolbar, click New > Network Group.
-
In the Enter Object Name field, enter the desired name.
-
Click the + icon and select the applicable network objects.
-
Click OK.
-
Close the Object Explorer.
-
-
Edit the Gateway object:
-
In SmartConsole, from the left navigation panel, click Gateways & Servers.
-
Double-click the Gateway object.
The Gateway Properties window shows. -
On the General Properties pane, check the IPSec VPN box.
-
-
Define your Network Group as the encryption domain of the gateway object:
-
In SmartConsole, from the left navigation panel, click Gateways & Servers.
-
Double-click the Gateway object.
The Gateway Properties window shows. -
In the gateway object left tree, click Network Management > VPN Domain.
-
Select manually defined.
-
In the right corner of this field, click the [...] button and select the Network Group object you created in Step 1.
-
-
Define the VPN community:
-
In the gateway object left tree, click IPsec VPN.
-
In the section This Security Gateway participates in the following VPN Communities, select the applicable VPN community.
-
-
Define the outgoing VPN interface:
-
In the Security Gateway object left tree, click IPsec VPN > Link Selection.
-
In the IP Selection by Remote Peer section, select Always use this IP address > Statically NATed IP, and then enter the gateway public IP address.
-
In the Outgoing Route Selection section:
-
Click Source IP address settings.
-
Select Automatic (derived from method of IP selection by remote peer).
-
Click OK.
-
-
In the Tracking section, select the desired option.
-
Click OK to close the Gateway Properties window.
-
-
Configure the VPN Community to use Permanent Tunnels:
-
In SmartConsole, click the Objects menu > Object Explorer.
-
In the left tree, clear all boxes except for VPN Communities.
-
Double-click the VPN community, in which this gateway object participates.
The VPN Community window shows. -
In the left tree, click Tunnel Management.
-
Select Set Permanent Tunnels.
-
Select the applicable option.
-
Click OK to close the VPN Community properties window.
-
Close the Object Explorer.
-
-
Install the applicable Access Control Policy on the gateway object.
Testing and Troubleshooting
Security Gateway
-
In AliCloud ECS console. Go to the instance and check system log is finished successfully (machine is ready to be logged in):
Expected output:‘
This system is for authorized use only.
'
login -
Connect VIA SSH using configured SSH key / Password
-
Check user-data script finished successfully by running in Expert mode:
cat /var/log/alicloud-user-data.log
Expected output:
Finished user data
-
Check both interfaces are configured correctly.
-
In the SmartConsole, check Device & License Information for problems.
-