In This Section: |
This section describes how to set up and manage your Check Point Appliance.
The Device > Internet page shows how the Check Point Appliance connects to the Internet. You can configure a single Internet connection or multiple connections in High Availability or Load Balancing configurations. When multiple Internet connections are defined, the page shows them in a table. You can add a new connection and edit, delete, or disable existing connections. When there are multiple Internet connections, you can select which mode to use - High Availability or Load Balancing.
We recommend you contact your local Internet Service Provider (ISP) to understand how to configure your specific Internet connection.
Note - ADSL/VDSL settings are relevant only for devices that have a DSL port.
To configure Internet connectivity:
The New or Edit Internet Connection window opens.
Configuration tab
Note - When you change the connection type, the appliance may disconnect from the Internet.
IPv4 connection types (all appliances):
Note - If you use an analog modem through the serial port, you cannot connect to the appliance with the serial port or get terminal server functionality. For more on the terminal server, go to Device > Advanced Settings.
Fill in the fields that are shown for the connection type.
Note - You cannot use these characters when you enter a password or shared secret: { } [ ] ` ~ | ' " # + \
IPv6 connection types (1200R and 1400 appliances only):
Note - The device can have only a single IPv5 Internet connection.
For PPPoE over ATM over VDSL/ADSL or IPoE over ATM over VDSL/ADSL (1430/1450 appliances), or for an ADSL interface (1100 appliances):
Enter the VPI number and VCI number you received from your service provider, and the Encapsulation type (LLC or VC_MUX).
For WAN/DMZ interfaces and static, DHCP, PPPoE, PPTP, and L2TP connection types
Or
For VDSL/ADSL interfaces and IPoE - dynamic IP and IPoE - static IP connection types over PTM:
If you are in an Annex L system, in Advanced Settings, you must enable the Annex L and disable the Annex J/M.
If you are in an Annex M system, in Advanced Settings, you must enable Annex J/M and disable the Annex L. In all other Annex systems, no changes are needed to the default configuration.
Notes:
Connection Monitoring tab
Advanced tab
For PPPoE
For PPTP and L2TP
Port Settings
Note - For a DMZ interface the MTU value is applied to all LAN ports.
To avoid fragmentation (which slows transmission), set the MTU according to the smallest MTU of all the network devices between your gateway and the packet destination.
For static and DHCP mode, set MTU to 1500 or lower.
For PPPoE connections, set MTU to 1492 or lower.
Note - When the gateway is behind a modem that works as a NAT device, the MTU value of the gateway must be the same value as in the modem. If the modem has a PPPoE connection, set the MTU in the gateway to 1492 or lower.
QoS Settings (bandwidth control) - supported in IPv4 connections only
To enable QoS bandwidth control for download and upload for this specified connection, select the applicable Enable QoS (download) and/or Enable QoS (upload) checkboxes. Enter the maximum Kbps rates for the selected options as provided by your ISP for the Internet upload and download bandwidth.
Make sure that the QoS blade has been turned on. You can do this from Home > Security Dashboard > QoS > ON.
Note - QoS is not implemented for VDSL/ADSL interfaces.
ISP Redundancy - supported in IPv4 connections only
Multiple Internet connections can be configured in High Availability or Load Sharing modes. When you configure more than one Internet connection, the Device > Internet page lets you toggle between these options. The Advanced setting of each Internet connection lets you configure each connection's priority or weights based on the set mode.
NAT Settings
If the gateway's global hide NAT is turned on in the Access Policy > NAT page, you can disable NAT settings for specified internet connections.
To disable NAT settings:
The Edit Internet Connection window opens.
The Device > Wireless page shows the wireless network settings (if applicable). You can configure your main wireless network and also additional guest or standard wireless networks (VAPs - Virtual Access Points).
To delete the wireless network, go to Device > Local Network.
If multiple wireless networks (VAPs) are defined, the page shows them in a table, where you can add a new guest or standard wireless network and edit, delete, or disable existing ones.
To turn the Wireless network on or off:
To edit the radio settings:
This configuration is global for all wireless networks. Some options may not be available or allowed depending on your country's wireless standards.
1100 appliances only: The wireless client search options depend on the frequency that the appliance is set to. The Check Point Appliance can be configured to only one frequency: 2.4 GHz. The Home > System page shows the wireless radio status.
1430/1450 appliances only: The wireless client search options depend on the frequency that the appliance is set to. The Check Point Appliance can be configured to only one frequency at a time and is set to 2.4 GHz by default. If you change the radio settings to 802.11 ac or 802.11 ac/n, the frequency automatically changes to 5 GHz. The Home > System page shows the wireless radio status.
1470/1490 appliances only: There are two radio transmitters: 2.4 GHz and 5 GHz. Each network is configured separately under a specified transmitter.
Dynamic Frequency Selection (DFS) detects radar signals that must be protected against interference from 5.0 GHz (802.11ac/n) radios. When these signals are detected, the operating frequency of the 5.0 GHz (802.11ac/n) radio switches to one that does not interfere with the radar systems. DFS is enabled by default.
To edit a wireless network:
Click Edit Settings.
The Edit window opens in the Configuration tab.
Configuration tab
Wireless Security
The Password option allows a single password for all users. This option is known as WPA Personal.
The RADIUS servers (Enterprise mode) option requires defining RADIUS servers in the Users & Objects > Authentication Servers page. Each user that tries to connect to the wireless network is authenticated through the RADIUS server. This option is also known as WPA Enterprise.
Advanced Settings
Wireless Network tab
Interface Configuration
Note - 1100 appliances only support IPv4 addresses. 1200R and 1400 appliances support both IPv4 and IPv6 addresses.
DHCPv4 Server section
Select one of the options:
IPv6 Auto Assignment section
Select one of the options:
Access Policy tab
These options create automatic rules that are shown in the Access Policy > Firewall Policy page.
Advanced tab
Click the checkbox to exclude from DNS proxy.
Advanced IPv6 Settings
Configure the Router Advisement fields.
DHCP/SLAAC Settings tab
Note - In IPv4-only mode, this tab is called DHCP4 Settings.
The values for the DHCP options configured on this tab will be distributed by the DHCP server to the DHCP clients.
DHCP Server Settings (For DHCPv6/SLAAC)
Select one of these options:
DNS Server Settings (For DHCPv4)
These settings are effective only if a DHCPv4 server is enabled.
Select one of these options:
Default Gateway
Select one of these options:
WINS
Select one of these options:
Lease
Other Settings
You can optionally configure these additional parameters so they will be distributed to DHCP clients:
Custom Options
Lets you add custom options that are not listed above. For each custom option, you must configure the name, tag, type, and data fields.
When you finish editing the network, click Apply.
The Device > Local Network page lets you set and enable the local network connections, switches, bridge or wireless network (on wireless devices only).
Note - 1100 appliances only support IPv4 addresses. 1200R and 1400 appliances support both IPv4 and IPv6 addresses.
The Network table shows all available network connections.
The page also lets you:
1400 appliances only: There are two radio transmitters: 2.4 GHz and 5 GHz. Each network is configured separately under a specified transmitter.
To create any of the above options:
Click New and choose the option you want.
To edit/delete/enable/disable any of the above options:
Select the relevant row and click Edit/Delete/Enable/Disable.
Notes:
To create/edit a switch:
Note - Between the LAN ports of a switch, traffic is not monitored or inspected. MAC filtering is disabled.
Configure the fields in the tabs:
Configuration tab
Select one of the options:
IPv6 Auto Assignment for IPv6 configurations:
Note - The common use case is a prefix length of 64. If you change it from 64, make sure the internal hosts support the new length.
Monitor Mode
Security Gateways can monitor traffic from a Mirror Port or Span Port on a switch.
With Monitor Mode, the appliance uses Automatic Learning or user-defined networks to identify internal and external traffic, and to enforce policy.
Automatic Learning - The appliance automatically recognizes external networks by identifying the default gateway's network from requests to the Internet (specifically, requests to Google). The rest of the networks are considered internal.
User-Defined Networks - You can manually define internal networks. If a network is not defined as internal, it is considered external.
In both Automatic Learning and user-defined networks:
To configure monitor mode in the WebUI:
The Edit window opens in the Configuration tab.
The Manually define internal networks checkbox shows.
The network definition features and table show.
The Internal network you defined (with Monitor Mode in the name) shows in the list of interfaces.
Note - You can configure multiple local networks to be in monitor mode at the same time (1400 appliances only).
After you configure monitor mode:
To configure monitor mode in CLI:
<portName>> set interface
monitor-mode
> set monitor-mode-configuration use-defined-networks false
<IP>> add monitor-mode-network ipv4-address
subnet-mask <mask> > set monitor-mode-configuration use-defined-networks true
> show monitor-mode-network
> set antispoofing advanced-settings global-activation false
If you do not see the Monitor Mode option:
set monitor-mode-configuration allow-monitor-mode true
Monitor Mode is now added to the options list.
For more information on monitor mode, see sk112572.
To edit a physical interface:
Configure the fields in the tabs. Note that for the DMZ there is an additional tab Access Policy:
Configuration tab
Select one of the options:
Enabled - Enter the IP address range and if necessary the IP address exclude range. The appliance's own IP address is automatically excluded from this range. You can also exclude or reserve specific IP addresses by defining network objects in the Users & Objects > Network Objects page. Reserving specific IP addresses requires the MAC address of the device.
Relay - Enter the DHCP server IP address.
Disabled
Note - When you create a switch, you cannot remove the first interface inside unless you delete the switch.
Advanced tab
The options that are shown vary based on interface type and status. Configure the options that are applicable:
Best Practice - This is a rare configuration. Do not select this option unless you are sure you need it.
Note - This option is not supported in 1100 appliances.
Access Policy tab (only for DMZ)
These options create automatic rules that are shown in the Access Policy > Firewall Policy page.
To create/edit a tag based VLAN:
You can create a new VLAN only if you have at least one physical interface that is not part of an existing network (switch or bridge).
Note - For more information on the maximum number of VLANs that you can configure for each appliance, refer to sk113247.
Configure the fields in the tabs:
Configuration tab
Select one of the options:
To create/edit a VPN Tunnel (VTI):
A Virtual Tunnel Interface (VTI) is a virtual interface on a Security Gateway that is related to an existing, Route Based VPN tunnel. The Route Based VPN tunnel works as a point-to-point connection between two peer Security Gateways in a VPN community. Each peer Security Gateway has one VTI that connects to the tunnel.
The VPN tunnel and its properties are defined by the VPN community that contains the two gateways. You must define the VPN community and its member Security Gateways before you can create a VTI.
Configure the fields in the tab:
Configuration tab
The VPN tunnel interface can be numbered or unnumbered. Select the applicable option:
To create/edit a bridge:
Configure the fields in the tabs:
Configuration tab
Select one of the options:
Advanced tab
Best Practice - This is a rare configuration. Do not select this option unless you are sure you need it.
Note – This option is not supported in 1100 appliances
Advanced IPv6 Settings
Configure the Router Advisement fields.
To create/edit a Virtual Access Point (VAP):
See the Device > Wireless Network help page.
DHCP/SLAAC Settings tab
Note - In IPv4-only mode, this tab is called DHCPv4 Settings.
The values for the DHCP options configured on this tab will be distributed by the DHCP server to the DHCP clients.
DNS Server Settings (For DHCPv6/SLAAC)
Select one of these options:
DNS Server Settings (For DHCPv4)
These settings are effective only if a DHCPv4 server is enabled.
Select one of these options:
Default Gateway
Select one of these options:
WINS
Select one of these options:
Lease section
Other Settings
You can optionally configure these additional parameters so they will be distributed to DHCP clients:
Custom Options
Lets you add custom options that are not listed above. For each custom option, you must configure the name, tag, type, and data fields.
In the Device > Hotspot page you can configure:
If no network interface was defined for the Hotspot, click Configure in Local Network.
In the Access section of the page, you can configure if authentication is required and allow access to all users or to a specified user group (Active Directory, RADIUS or local).
Hotspot is automatically activated in the system.
To turn off Hotspot:
To configure Hotspot for an interface:
The Local Network window opens.
The Edit <interface> window opens.
Any user that browses from configured interfaces is redirected to the Check Point Hotspot portal.
To configure Hotspot exceptions:
The Manage Hotspot Network Objects Exceptions window opens.
The Selected Network Objects window shows the selected objects. To remove an object from the list, click the x next to it.
The added objects are excluded from the Hotspot.
To require user authentication:
Any user/user group that browses from configured interfaces is redirected to the Check Point Hotspot portal and must enter authentication credentials.
To configure the session timeout:
To customize the portal appearance:
To prevent simultaneous login to the Hotspot portal:
The Hotspot window opens.
The same user cannot log in to the Hotspot portal from more than one computer at a time.
On the Active Computers page (available through the Home and Logs & Monitoring tabs), you can revoke Hotspot access for connected users.
The Device > Routing page shows routing tables with the routes added on your appliance.
Note - 1100 appliances support only IPv4 addresses. 1200R and 1400 appliances support both IPv4 and IPv6 IP addresses.
On this page:
For every route:
Table Columns |
Description |
---|---|
Destination |
The route rule applies only to traffic whose destination matches the destination IP address/network. |
Source |
IPv4 only. The route rule applies only to traffic whose source matches the source IP address/network |
Service |
IPv4 only. The route rule applies only to traffic whose service matches the service IP protocol and ports or service group. |
Next Hop |
The next hop gateway for this route, with these options:
|
Metric |
Determines the priority of the route. If multiple routes to the same destination exist, the route with the lowest metric is selected. |
To add a new static route (IPv4 addresses):
The New Routing Rule window opens with this message: Traffic from any source to any destination that belongs to any service should be routed through the next hop.
Note - Static routes are not supported for source based or service based routes.
To configure a default route:
The Edit window opens in the Configuration tab.
Or
To edit a default route:
The Edit Internet Connection window opens in the Configuration tab.
When no default route is active, this message shows: "Note - No default route is configured. Internet connections might be down or not configured."
For Internet Connection High Availability, the default route changes automatically on failover (based on the active Internet connection).
When a network interface is disabled, all routes that lead to it show as inactive in the routing page. A route automatically becomes active when the interface is enabled. Traffic for an inactive route is routed based on active routing rules (usually to the default route).
The edit, delete, enable, and disable options (on the Device > Local Network page) are only available for manually defined routing rules created on this page. You cannot edit, delete, enable, and disable routing rules created by the operating system for directly attached networks or rules defined by the dynamic routing protocol.
To edit an existing route:
Select the route and click Edit.
To delete an existing route:
Select the route and click Delete.
To enable/disable an existing route:
Select the route and click Enable or Disable.
MAC Filtering
MAC Filtering lets you manage a whitelist of MAC addresses that can access the LAN. All others are blocked. The list is global for all interfaces defined on physical LAN ports.
To enable MAC filtering:
Note - MAC filtering is not active when no MAC addresses are defined.
After MAC filtering is enabled, you can disable the feature for specified networks.
To edit the LAN MAC Filter whitelist:
To disable MAC filtering for a specific interface:
The Edit LAN window opens.
To enable, clear this option.
Limitations:
802.1x Authentication Protocol
IEEE 802.1x is a port-based network access protocol that provides an authentication mechanism for devices that are physically attached to the network.
802.1x authentication is enabled only when you define a LAN or a DMZ network as a separate network and a RADIUS server is defined.
Workflow:
If you configure a physical switch (port-based VLAN) between multiple LAN ports, you cannot activate the 802.1x protocol on this network. Replace the switch with a bridge configuration.
To enable 802.1x authentication on a separate LAN interface:
The Edit window opens in the Configuration tab.
To enable 802.1x authentication on a tag based VLAN interface:
The New VLAN window opens in the Configuration tab.
To disable 802.1x authentication on an interface:
Select the LAN interface and click Edit.
To configure logging for MAC filtering and 802.1x authentication:
Note - This attribute is available only in Locally Managed mode. In Centrally Managed mode, configure logging with CLI.
Note - Traffic dropped in the WiFi driver is not logged.
In the Device > DNS page you can configure the DNS server configuration and define the domain name.
To configure DNS:
If you select Configure DNS servers, make sure that you enter valid IP addresses.
Use the first option if your DNS servers are located in the headquarters office. In this case, all DNS requests from this branch office are directed to these DNS servers.
The second option allows a more dynamic definition of DNS servers. The gateway uses the DNS settings of the currently-active Internet connection (in case of static IP – the DNS manually provided under "Internet connection"-> Edit, in case of DHCP / Dialers – the DNS automatically provided by the ISP). If Internet Connection High Availability is enabled, the DNS servers switch automatically upon failover.
To get IP addresses directly from the DNS servers defined above, clear the Enable DNS Proxy checkbox.
When DNS proxy is enabled, Resolve Network Objects controls if the DNS proxy treats the local network objects as a hosts list. When selected, the local DNS servers resolves network object names to their IP addresses for internal network clients.
Note these syntax guidelines:
In the Device > Proxy page, you can configure a proxy server to use to connect to the Check Point update and license servers.
To configure a proxy server:
In the Device > System Operations page you can:
To reboot the appliance:
The appliance reboots.
To restore factory default settings:
The factory default settings are restored. The appliance reboots to complete the operation.
Note - This does not change the software image. Only the settings are restored to their default values (IP address
, the username: admin and password: admin).https://192.168.1.1:4434
To revert to the factory default image:
The factory default settings are restored. The appliance reboots to complete the operation.
Note - This restores the default software image which the appliance came with and also the default settings (IP address
, the username: admin and password: admin).https://192.168.1.1:4434
To make sure you have the latest firmware version:
Click Check now.
To automatically upgrade your appliance firmware when Cloud Services is not configured:
The Automatic Firmware Upgrades window opens.
Or
Notes:
To manually upgrade your appliance firmware:
The Upgrade Software Wizard opens.
Note - The firewall remains active while the upgrade is in process. Traffic disruption can only be caused by:
To revert to an earlier firmware image:
The appliance reboots to complete the operation.
To backup appliance settings:
The Backup Settings page opens.
To restore a backed up configuration:
Important Notes
IPv6 Mode
To enable IPv6 networking and enforce IPv6 security (1200R and 1400 appliances only):
The IPv6 Enforcement Settings window opens.
Note - This causes the appliance to reboot.
Follow the instructions in each page of the Software Upgrade Wizard.
During the wizard click Cancel to quit the wizard.
Welcome
Click the Check Point Download Center link to download an upgrade package as directed. If you already downloaded the file, you can skip this step.
Upload Software
Click Browse to select the upgrade package file.
Click Upload. This may take a few minutes. When the upload is complete, the wizard automatically validates the image. A progress indicator at the bottom of the page tells you the percentage completed. When there is successful image validation, an "Upload Finished" status shows.
Upgrade Settings
The system always performs an upgrade on a separate flash partition and your current-running partition is not affected. You can always switch back to the current image if there is an immediate failure in the upgrade process. If the appliance does not come up properly from the boot, disconnect the power cable and reconnect it. The appliance automatically reverts to the previous image.
Click the Revert to Previous Image button on the System Operations page to return to an earlier image. The backup contains the entire image, including the firmware, all system settings and the current security policy.
When you click Next, the upgrade process starts.
Upgrading
The Upgrading page shows an upgrade progress indicator and checks off each step as it is completed.
In the Device > System Operations page you can backup and restore system settings.
To create a backup file:
The Backup Settings window opens.
If you select this option, you must enter and confirm a password.
System settings are backed up.
The backup file includes all your system settings such as network settings and DNS configuration. The backup file also contains the Secure Internal Communication certificate and your license.
If you want to replace an existing appliance with another one, you can restore the settings of your previous appliance and re-activate your license (through License Page > Activate License).
If you want to duplicate an existing appliance, you can restore the settings of the original appliance on the new one. Make sure to change the IP address of the duplicated appliance (Device > Internet page) and generate a new license.
To configure a periodic backup to the FTP server:
The Periodic Backup Settings window opens.
If you select this option, you must enter and confirm a password.
To configure a file storage destination:
The Periodic Backup Settings window opens.
The Device > Administrators page lists the Check Point Appliance administrators and lets you:
Administrators can also be defined in a remote RADIUS server and you can configure the appliance to allow them access. Authentication of those remotely defined administrators is done by the same RADIUS server.
Administrator Roles:
Two administrators with write permissions cannot log in at the same time. If an administrator is already logged in, a message shows. You can choose to log in with Read-Only permission or to continue. If you continue the login process, the first administrator session ends automatically.
The correct Administrator Role must be configured to perform the operations listed below. If not, a Permission Error message shows.
To create a local administrator:
The Add Administrator page opens.
The name and Administrator Role is added to the table. When logged in to the WebUI, the administrator name and role is shown at the top of the page.
To edit the details of locally defined administrators:
To delete a locally defined administrator:
Note - You cannot delete an administrator who is currently logged in.
To allow access for administrators defined in a remote RADIUS server:
Note - 1100 appliances only support IPv4 addresses. 1200R and 1400 appliances support both IPv4 and IPv6 addresses.
The RADIUS Authentication window opens.
Use roles defined on RADIUS server is selected by default.
Note - A user without role definition will get a login error.
To set the Session Timeout value for both local and remotely defined administrators:
The Administrators Security Settings window opens.
Note - This page is available from the Device and Users & Objects tabs.
Configuring a RADIUS Server for non-local Check Point Appliance users:
Non-local users can be defined on a RADIUS server and not in the Check Point Appliance. When a non-local user logs in to the appliance, the RADIUS server authenticates the user and assigns the applicable permissions. You must configure the RADIUS server to correctly authenticate and authorize non-local users.
Note - The configuration of the RADIUS Servers may change according to the type of operating system on which the RADIUS Server is installed.
Note - If you define a RADIUS user with a null password (on the RADIUS server), the appliance cannot authenticate that user.
To configure a Steel-Belted RADIUS server for non-local appliance users:
checkpoint.dct
on the RADIUS server, in the default dictionary directory (that contains radius.dct
). Add these lines to the file:
|
vendor.ini
file on RADIUS server (keep in alphabetical order with the other vendor products in this file):
|
dictiona.dcm
file the line: “@checkpoint.dct”
<role>CP-Gaia-User-Role =
Where <role> allowed values are:
Administrator Role |
Value |
---|---|
Super Admin |
adminrole |
Read only |
monitorrole |
Networking Admin |
networkingrole |
To configure a FreeRADIUS server for non-local appliance users:
dictionary.checkpoint
in /etc/freeradius/
on the RADIUS server:
|
/etc/freeradius/dictionary
the line: “$INCLUDE dictionary.checkpoint”
<role>CP-Gaia-User-Role =
Where <role> is the name of the administrator role that is defined in the WebUI.
Administrator Role |
Value |
---|---|
Super Admin |
adminrole |
Read only |
monitorrole |
Networking Admin |
networkingrole |
To configure an OpenRADIUS server for non-local appliance users:
dict.checkpoint
in /etc/openradius/subdicts/
|
$include subdicts/dict.checkpoint
/etc/openradius/dictionaries
dict.ascend
<role>CP-Gaia-User-Role =
Where <role> is the name of the administrator role that is defined in the WebUI.
Administrator Role |
Value |
---|---|
Super Admin |
adminrole |
Read only |
monitorrole |
Networking Admin |
networkingrole |
To log in as a Super User:
A user with super user permissions can use the Check Point Appliance shell to do system-level operations, including working with the file system.
Expert
The Device > Administrator Access page lets you configure the IP addresses and interface sources that administrators can use to access the Check Point Appliance. You can also configure the Web and SSH ports.
Note - 1100 appliances support only IPv4 addresses. 1200R and 1400 appliances support both IPv4 and IPv6 addresses.
First set the interface sources from which allowed IP addresses can access the appliance.
To set the interface sources from which administrator access is allowed:
Select one or more of the options:
To allow administrator access from any IP address:
To allow administrator access from specified IP addresses:
The IP Address Configuration page shows.
The IP address is added to the table.
To allow administrator access from both specified and any IP addresses:
Select this option when it is necessary to allow administrator access from the Internet (you must define the specified IP addresses). Access from other sources is allowed from any IP address.
The IP Address Configuration page shows.
The IP address is added to the table.
To delete administrator access from a specific IP address:
Important Notes:
In the Device > Device Details page, you can:
Note - The appliance name can only contain alphanumeric characters and the hyphen character. Do not use the hyphen character as the first or last character.
Important - If the gateway's Internet connection is assigned an IP address dynamically and the identifier option in SmartDashboard is set to Gateway name, the Appliance Name must be identical to the Check Point Appliance name defined for the Check Point Appliance object in SmartDashboard. |
To assign a Web portal certificate:
The list of uploaded certificates shows.
The Device > Date and Time page shows the current system time and lets you define the Check Point Appliance date and time, optionally using NTP.
To manually configure date and time:
To use Network Time Protocol (NTP) to synchronize the clocks of computers on the network:
Time Zone
In the Device > DDNS & Device Access page, you can:
DDNS
When you configure DDNS, the appliance updates the provider with its IP addresses. Users can then connect to the device with a host name from the provider instead of IP addresses.
This is especially important for remote access users who connect to the device to the internal network through VPN.
To configure DDNS:
For more information about these details, refer to your provider's website.
Reach My Device
Reach My Device lets you remotely connect to the appliance from the Internet so that you can use the WebUI or CLI when necessary. This is done by tunneling the administrative UI or CLI connections through a Check Point Cloud Service. Such configuration is very useful in instances where the appliance is behind a NAT device or firewall, and cannot be reached directly. In addition, the feature makes it easier to access an appliance with a dynamically assigned IP address.
Item |
Description |
---|---|
1 |
Register the Check Point Appliance to the Check Point Cloud Service - When you first enter the Device > DDNS & Device Access page you see a link to register the appliance. Use the procedure below to register the appliance to the service. |
2 |
When registration is complete - An outgoing tunnel to the Check Point Cloud Service is established with the appliance's IP address. In the WebUI, the Device > DDNS & Device Access page shows:
|
3 |
When an administrator requires access to the WebUI or CLI, the applicable URL is entered in a browser and gets to the Web Service in the cloud. |
4 |
The administrator gains access to the appliance WebUI or CLI through a pipe established by the Check Point Cloud Service to the appliance. |
To register to allow connections to the appliance when it is unreachable from the Internet:
The Reach My Device window opens.
The validation token, web link, and shell link are shown on the DDNS & Appliance Access page.
See Using System Tools.
On the Installed Certificates page, you can create and manage appliance certificates or upload a P12 certificate. Uploaded certificates and the default certificates are displayed in a table. To see certificate details, click the certificate name.
On the Device > Device Details page, you can select and assign a Web portal certificate from the list of installed certificates.
Installed certificates are used in the Web portal.
These are the steps to create a signed certificate:
To create a new certificate to be signed by a CA:
The new signing request is added to the table and the status shows "Waiting for signed certificate". Note - You cannot edit the request after it is created.
To export the signing request:
Click Export.
To upload the signed certificate when you receive the signed certificate from the CA:
The status of the installed certificate record changes from "Waiting for signed certificate" to "Verified".
To upload a P12 file:
The Security Gateway is not part of a Security Cluster. To define it as a cluster member, define a Security Cluster object in your Security Management Server and install a security policy.
Note - A cluster in bridge in Active/Standby mode is supported in 1200R and 1400 appliances.
The Device > Advanced Settings page is for advanced administrators or Check Point support. You can configure values for multiple advanced settings for the various blades.
Important - Changing these advanced settings without fully understanding them can be harmful to the stability, security, and performance of this appliance. Continue only if you are certain that you understand the required changes. |
For further details regarding the attributes, consult with Check Point support when necessary.
To filter the list of attributes:
The search results are dynamically shown as you type.
To configure the appliance attributes:
The attribute window opens.
The appliance attribute is configured.
To reset all the appliance attributes to the default settings:
The Confirm window opens.
All appliance attributes are reset to the default settings.
Additional Information for Attributes
Attribute |
Description |
|
---|---|---|
DHCP relay |
Use internal IP addresses as source |
Select Use internal IP addresses as source if DHCP relay packets from the appliance will originate from internal IP addresses. This may be required if the DHCP server is located behind a remote VPN site. |
Hotspot |
Enable portal |
Select Disabled to disable the hotspot feature entirely. |
Serial port |
Enable serial port |
With the serial port parameters you can configure the console port on the back panel of the appliance. You can disable it completely (clear the Enable serial port checkbox) if necessary and configure port speed and flow control settings. Note that these settings must match the configuration of the device connected to the console port. There are three modes for working with this port: Console - This is the default mode configured. The port is used to access the appliance's console. Active - Instead of connecting through the port to the appliance's console, the data is relayed to a specified telnet server which can now be viewed through this port. Enter the Server TCP port of the telnet server and the IP address of the server. Two different IP server IP addresses can be configured (Primary server and Secondary server). Passive - In this mode the flow of data is reversed and the appliance connects through the serial port to the console of the connected device. This console will be accessible through a telnet connection to a configured port on the appliance. In Listen on TPC port, enter the port number. You must manually define an access rule in the Firewall Rule Base in SmartDashboard. Two appliances, one in active mode and the other in passive mode, can allow a client to remotely connect to a console connected to the appliance in passive mode over the internet using a telnet connection. |