In This Section: |
This chapter contains workflows for common configuration and upgrade scenarios.
Introduction
Cloud Services lets you connect your Check Point Appliance to a Cloud Services Provider that uses a Web-based application to manage, configure, and monitor the appliance.
Prerequisites
Before you connect to Cloud Services, make sure you have:
Or
To automatically connect to Cloud Services:
After you log in, a window opens and shows the activation details sent in the email.
For more details, see Configuring Cloud Services.
To manually connect to Cloud Services:
In some situations, you need to allow guest access to the Internet from within your organization. At the same time, you may want to restrict access to internal network resources. When you configure a guest network with a Hotspot, you can control network access. If you set user authentication options, you can then monitor the users that connect to the network.
Prerequisites
Configuration
Monitoring
Connect to the network and open a browser session. You see the customized Hotspot portal.
Note - You are shown the Hotspot portal one time in the given timeout period. The default timeout period is 4 hours.
User activity on this network is logged with user names if the Log traffic option was selected.
This section describes how to configure these VPN configuration scenarios:
Note - VPN does not work with pure IPv6, only with dual stack.
Introduction
Use these options for remote access:
Prerequisites
Remote Access Configuration
These are the methods to configure remote access users:
To allow only specified users to connect with a remote access client, set group permissions for the applicable user type. Select the arrow next to the Add option and select the relevant group option. See Configuring Remote Access Users.
To configure local users:
For new users:
For more information, see Configuring Remote Access Users.
For existing users:
For more information, see Configuring Remote Access Users.
To configure RADIUS users:
To configure AD users:
L2TP VPN Client configuration
For L2TP VPN Client configuration, click L2TP Pre-shared key to enter the key after you enable the L2TP VPN client method.
Advanced Options
For more information on advanced Remote Access options, for example Office Mode network, see Configuring Advanced Remote Access Options.
Monitoring
To make sure Remote Access is working:
Use the configured client to connect to an internal resource from a remote host.
Introduction
In this Site to Site VPN configuration method a preshared secret is used for authentication.
Prerequisites
Configuration
Enter a host name or IP address and enter the preshared secret information. For more information, see Configuring VPN Sites.
Monitoring
To make sure the VPN is working:
Introduction
In this Site to Site VPN configuration method a certificate is used for authentication.
Prerequisites
Configuration
Follow the steps for the applicable procedure listed in the Trust Procedures section below.
Trust Procedures
Exchange CAs between gateways:
Click Add to add the Trusted CA of the peer gateway. This makes sure the CA is uploaded on both the local and peer gateways. See Managing Trusted CAs.
Sign a request using one of the gateway's CAs:
You create a request from one gateway that must be signed by the peer gateway's CA.
Authenticate by using a 3rd party CA:
You create a signing request from each peer gateway. Follow the steps above in Sign a request using one of the gateway's CAs to sign it with a 3rd party CA.
Note that a 3rd party CA can either issue *.crt, *.p12, or *.pfx certificate files.
Authenticate with an existing 3rd party certificate:
Monitoring
To make sure the VPN is working:
Introduction
The QoS (bandwidth control) policy is a set of rules that lets you set bandwidth parameters that control the flow of traffic to and from your network. They make sure that important traffic is prioritized and your business has minimal disruption when there is network congestion.
QoS can be activated on Internet connections and requires at least one Internet connection is configured with the maximum download and/or upload speeds. You get the speed information from your ISP.
QoS policy rules apply separately on each configured Internet connection.
Prerequisites
In Access Policy > QoS > Blade Control, make sure the QoS blade is turned on.
Configuration
These values are used as a 100% percent baseline when you calculate QoS weight. For more details, see Configuring Internet Connectivity.
Introduction
Configure a cluster to maintain connections in the organization's network when there is a failure in a cluster member. The cluster provides redundancy.
Cluster High Availability is supported. In High Availability, only one gateway is active at a time. When there is a failover, the standby member becomes active. There is no load sharing between the members of the cluster.
All cluster configuration is done through the active member.
Note - Bridge and switch configurations are not supported in cluster configuration.
Configuration workflow:
Prerequisites
Note - Connect the sync cable only after you complete the First Time Configuration Wizard and remove the switch on both appliances. No additional configuration is required on both members.
Best Practice - Designate the same LAN port for the Sync interface. The default Sync interface is LAN2/SYNC.
For the primary (active) cluster member:
For the secondary (standby) cluster member:
Complete other configuration requirements such as access policy, VPN, and Threat Prevention parameters. The primary and secondary members now synchronize their configuration.
Monitoring the Cluster
Best Practice - After the cluster is successfully configured, connect to https://my.firewall
. This redirects you to the WebUI Home > System page for the active cluster member.
To log in to each appliance:
Go to https://<IP>:4434.
<IP>
is the IP address of a specified member.
Note - Not all options are available as all cluster configuration is done through the active member. The WebUI of the standby cluster member only has one tab: Device.
To show the status of the cluster member:
Go to Device > High Availability.
When you upgrade a cluster member, you can maintain network connectivity during an upgrade. One member of the cluster remains active while the other cluster member is upgraded. The system is always active and there is no downtime during the upgrade process.
In a High Availability cluster, only one member is active at a time. The other appliance is standby. To upgrade a cluster, first upgrade the standby appliance and then upgrade the active member.
Upgrade workflow:
The standby member automatically reboots.
The active member automatically reboots.
Note - The upgrade process is the same for each cluster member. Only manual upgrade is supported.
After the reboot:
To manually upgrade a cluster member:
The Upgrade Software Wizard opens.
The upgrade process automatically reboots the member.
To see the status of each cluster member:
Go to Device > High Availability.
Introduction
Follow these configuration procedures to allow SIP traffic to pass through the gateway when:
Configuration
To allow application-level inspection and NAT of the SIP protocol:
To allow the SIP server to connect to internal phones from the Internet:
For example:
Source - Any
Destination - Any
Service - SIP
Action - Accept
For more information, see Working with the Firewall Access Policy.