In This Section: |
This section describes how to set up and manage your Check Point Appliance access policy.
In the Access Policy > Firewall Blade Control page you can set the default Access Policy control level, set the default applications and URLs to block and allow secure browsing, and configure User Awareness.
The Access Policy is a set of rules that defines the security requirements for your appliance for incoming, internal, and outgoing traffic.
The Access Policy includes:
The Access Policy > Firewall Blade Control page lets you easily define the default policy for your organization. In addition, you can define and view the rule based policy in the Access Policy > Firewall Policy page. Configurations in the Firewall Blade Control page are shown as automatically generated system rules at the bottom of the Rule Base. We recommend you use the Access Policy > Firewall Policy page to define manual rules that are exceptions to the default policy defined in this page.
The Access Policy > Firewall Blade Control page defines the default policy for incoming, internal, and outgoing traffic to and from your organization. In addition, the Access Policy > Firewall Servers page lets you easily define the default access policy for specific servers within your organization and automatically generated system rules are also defined.
Firewall Policy
Select one of these options to set the default Access Policy:
The Standard policy option is the default level and is recommended for most cases. Keep it unless you have a specified need for a higher or lower security level.
Note - When the blade is managed by Cloud Services, a lock icon shows. You cannot toggle between the on and off states. If you change other policy settings, the change is temporary. Any changes made locally are overridden in the next synchronization between the gateway and Cloud Services.
To set specified outgoing services in a standard Firewall policy:
To manually configure Access Policy rules:
Go to the Access Policy > Policy page.
In the Access Policy > Blade Control page:
Click Servers to see how many servers are defined in the appliance. If no servers are configured, click Add a server to add one. A server object is a defined IP address to which you can also define a specific access policy and also incoming NAT rules if necessary. For example, Port forwarding NAT. Automatically generated access rules to servers are created above the default policy rules and can be seen in the Access Policy > Firewall Policy page. You can create exception rules for servers as well in the Access Policy > Firewall Policy page.
Applications & URL Filtering
The Applications & URL Filtering section lets you define how to handle applications and URL categories on traffic from your organization to the Internet.
Applications and URL Filtering are service based features and require Internet connectivity to download the latest signature package for new applications and to contact the Check Point cloud for URL categorization. This page lets you define the default policy for Applications & URL Filtering control. It is recommended by default to block browsing to security risk categories and applications. You can also configure additional applications and categories to block by default according to your company's policy. In addition, you can also select to limit bandwidth consuming applications for better bandwidth control.
In addition to the On and Off buttons, you can select the URL Filtering Only mode. When you select this option, only URLs and custom applications defined by URLs are blocked. Predefined applications initially installed on your computer or added with automatic updates are not blocked.
When you select the URL Filtering Only mode:
The default policy defined here is viewed as automatically generated rules in the bottom of the Outgoing traffic Rule Base in the Access Policy > Policy page.
Select one or more of these options:
Updates
As a service based feature, this page also shows you the update status:
To schedule updates:
User Awareness
User Awareness lets you configure the Check Point Appliance to enforce access control for individual users and groups and show user-based logs instead of IP address based logs.
Initially, click Configure to set up how User Awareness recognizes users. When this is configured, you can see users in logs and also configure user based Access Policy rules. User recognition can be done seamlessly by the appliance using your organization's AD server. The user database and authentication are all done through the AD server. When a user logs in to the AD server, the appliance is notified. Users from the AD server can be used as the Source in Access Policy rules.
Alternatively or in addition, users can be defined locally in the Users & Objects > Users page with a password. For the appliance to recognize the traffic of those users, you must configure Browser-Based Authentication and the specific destinations to which they must be identified first before accessing. Normally, Browser-Based Authentication is not used for all traffic, but rather for specific destinations because it requires manual login by the end user through a dedicated portal.
If User Awareness has been configured, the Enable User Awareness checkbox is shown. To disable User Awareness, clear the checkbox. To make changes to the configuration, click Edit settings.
At any time, you can also click Active Directory servers to define an AD server that the gateway can work with. Creating an AD server is also available in the Edit settings wizard.
Tracking
Select which traffic to log:
For blocked traffic
For allowed traffic
These settings apply to all the incoming and outgoing traffic blocked or accepted by the default Firewall and Applications & URL Filtering automatically generated rules.
These settings do not apply to automatically generated rules for VPN, DMZ, and wireless networks.
More Information
The Check Point Application Database contains more than 4,500 applications and about 96 million categorized URLs.
Each application has a description, a category, additional categories, and a risk level. You can include applications and categories in your Application Control and URL Filtering rules. If your appliance is licensed for the Application Control & URL Filtering blades, the database is updated regularly with new applications, categories and social networking widgets. This lets you easily create and maintain an up to date policy.
You can see the Application Database from:
In the Access Policy > Firewall Policy page you can manage the Firewall Access Policy Rule Base. You can create, edit, delete, enable or disable rules. In the Access Policy > Firewall Blade Control page you determine the basic firewall policy mode.
In Standard mode, this page shows you both automatically generated rules based on the configuration of your default policy and manually defined rules as exceptions to this default policy.
In Strict mode, all access is blocked by default and this page is the only way to configure access rules for your organization.
The Rule Base is divided into two sections. Each of the two sections represent a different security policy - how your organization browses to the Internet (the world outside your organization) and the security policy to access your organization's resources (both from within and from outside your organization). At the top of the page there are three links that let you see both or only one of the sections.
In Standard mode, you can configure in various pages a more granular default policy:
This page lets you add manual rules as exceptions to the default policy. In Strict mode, the default policy blocks everything and you configure access only through manual rules.
Within each section there are these sections:
These are the fields that manage the rules for the Firewall Access Policy.
Rule Base Field |
Description |
---|---|
No. |
Rule number in the Firewall Rule Base. |
Source |
IP address, network object, or user group that initiates the connection. |
Destination |
IP address or network object that is the target of the connection. |
Application |
Applications or web sites that are accepted or blocked. You can filter the list by common applications, categories, custom defined applications, URLs or groups. For more information, see Managing Applications & URLs. This field is only shown in the Outgoing access to the Internet section. |
Service |
Type of network service that is accepted or blocked. |
Action |
Firewall action that is done when traffic matches the rule. For outgoing traffic rules, you can use the Customize messages option to configure "Ask" or "Inform" actions in addition to the regular Block or Accept actions. The messages shown can be set for these action types: Accept and Inform, Block and Inform, or Ask. Ask action lets the end user decide if this traffic is for work purposes or personal. See the Customize messages section below. Users are redirected to a portal that shows a message or question. If a time range is set for the rule, a clock icon is shown. |
Log |
The tracking and logging action that is done when traffic matches the rule. |
Comment / |
Details shown immediately below the above fields for:
|
The "Ask" action
The outgoing Rule Base gives the option to set an Ask action instead of just allow or block for browser based applications. There are several commonly used cases where this is helpful:
To create a new manually defined access rule:
The Add Rule window opens. It shows the rule fields in two ways:
Note - The Application field is relevant only for outgoing rules.
In the Source field, you can optionally select between entering a manual IP address (network), a network object, or user group (to configure a user based policy, make sure the User Awareness blade is activated). Users can be defined locally on the appliance or externally in an Active Directory. For more details, see the Access Policy > User Awareness Blade Control page.
The rule is added to the outgoing or incoming section of the Access Policy.
To clone a rule:
Clone a rule to add a rule that is almost the same as the one that already exists.
To edit a rule:
Note - For Access Policy rules, you can only edit the tracking options for automatically generated rules.
To delete a rule:
To enable or disable a rule:
To change the rule order:
Note - You can only change the order of manually defined rules.
Customize messages
You can customize messages to let the Security Gateway communicate with users. This helps users understand that some websites are against the company's security policy. It also tells users about the changing Internet policy for websites and applications. When you configure such messages, the user's Internet browser shows the messages in a new window when traffic is matched on a rule using one of the message related actions.
These are the Action options and their related notifications:
Rule Base action |
Notifications |
---|---|
Accept and Inform |
Shows an informative message to users. Users can continue to the application or cancel the request. |
Block and Inform |
Shows a message to users and blocks the application request. |
Ask |
Shows a message to users and asks them if they want to continue with the request or not. See above for more details. |
To customize messages:
For example, in a rule that contains in the Application - Social Networking category, if you select Once a day as the frequency, a user who accesses Facebook multiple times get one notification.
In the Servers page you can see a list of servers defined in your system. You can create, edit, delete or search for server objects. Server objects are network objects that are defined with their access and NAT (if applicable) policies.
New server objects are created using a wizard:
After you create a server, one or more corresponding rules are automatically generated and added to the Access Policy automatically and shown in the Access Policy > Firewall Policy page. The comment in the rule shows the object name. You can click the object name link in the comment to open the Access tab in the Server Properties.
An easier way to define server objects is by detecting them in the Home > Active Devices page and saving them as servers. For example, this option automatically detects the MAC address of the server making configuration easier.
During the wizard:
To create a new object:
Click New. The New Server Wizard opens and shows Step1: Server Type.
Step 1: Server Type
Step 2: Server Definitions
Step 3: Access
Step 4: NAT (when server is accessible from the Internet)
Select the relevant option:
When you complete the wizard, the server is added to the list of servers on the page and the automatically generated access rules are added to the Access Policy > Firewall Policy Rule Base.
Note - This page is available from the Firewall and NAT sections on the Access Policy tab.
In the Access Policy > Firewall NAT page you can configure NAT for outgoing traffic and see how many servers are defined in the system. Servers are defined in the Access Policy > Servers page and are network objects configured with their access and NAT settings. This lets you configure servers that are accessible from the Internet even if they do not have a routable IP address. You can also configure servers with NAT settings from this page.
To disable NAT for outgoing traffic (hide NAT):
By default, NAT is configured for outgoing traffic. If it is necessary to disable NAT, make sure Hide internal networks behind the Gateway's external IP address is set to OFF.
Important - In most cases, if you turn off the hide NAT feature, you cause Internet connectivity issues. If your appliance is the gateway of your office to the Internet DO NOT set to off without consulting with networking experts. |
To configure a server that is routable from the Internet (server with NAT):
After you create a server with NAT settings, one or more corresponding rules are automatically generated and added to the NAT rules under the Auto Generated Forwarding Rules section. Click View NAT rules to see them. The comment in the rule shows the server object name. You can click the object name link to open the Access tab of the server's properties or click the Servers page link to go to the Firewall Servers page.
Advanced - Manual NAT Rules
Note - For the majority of cases, manual NAT rules are not necessary. There is no need to use this option unless you are an experienced network administrator.
A more advanced way to configure address translation is by defining manual NAT rules. If servers with NAT are configured, the manual NAT rules do not apply to them. However, they apply even when Hide NAT is activated.
These are the fields that manage the NAT rules.
Rule Base Field |
Description |
---|---|
Original Source |
The network object (a specified IP address) or network group object (a specified IP address range) that is the original source of the connections to translate. |
Original Destination |
The network object (a specified IP address) or network group object (a specified IP address range) that is the original destination of the connections to translate. |
Original Service |
The original service used for the connections to translate. |
Translated Source |
The network object or network group object that is the new source to which the original source is translated. |
Translated Destination |
The network object or network group object that is the new destination to which the original destination is translated. |
Translated Service |
The new service to which the original service is translated. |
To create a new NAT rule:
The Add Manual NAT Rule window opens. It shows the rule fields in two manners:
When this option is not selected, you can still use an IP range in the Original Source and a different IP range of the same size in the Translated Source. This rule does the IP address translation from one range to another, respectively (the first IP in the first range is translated to the first IP in the second range, and so on).
After you create manual rule, it is added to the NAT rules table under the Manual NAT Rules section.
To edit a rule:
Note for Access Policy rules - you can only edit the tracking options for automatically generated rules.
To delete a rule:
To enable or disable a rule:
To change the rule order:
Note - You can only change the order of manually defined rules.
In the Access Policy > NAT Manual Rules page you can create and edit custom NAT rules. If servers with NAT are configured the manual NAT rules do not apply to them. However, they do apply even when Hide NAT is activated.
Note - For the majority of cases, manual NAT rules are not necessary. There is no need to use this option unless you are an experienced network administrator. See the Access Policy > NAT Control page for the commonly used options.
These are the fields that manage the NAT rules.
Rule Base Field |
Description |
---|---|
Original Source |
The network object (a specified IP address) or network group object (a specified IP address range) that is the original source of the connections to translate. |
Original Destination |
The network object (a specified IP address) or network group object (a specified IP address range) that is the original destination of the connections to translate. |
Original Service |
The original service used for the connections to translate. |
Translated Source |
The network object or network group object that is the new source to which the original source is translated. |
Translated Destination |
The network object or network group object that is the new destination to which the original destination is translated. |
Translated Service |
The new service to which the original service is translated. |
To create a new NAT rule:
The Add Rule window opens. It shows the rule fields in two manners:
When this option is not selected, you can still use an IP range in the Original Source and a different IP range of the same size in the Translated Source. This rule does the IP address translation from one range to another, respectively (the first IP in the first range is translated to the first IP in the second range, etc.).
To edit a rule:
Note for Access Policy rules - you can only edit the tracking options for automatically generated rules.
To delete a rule:
To enable or disable a rule:
To change the rule order:
Note - You can only change the order of manually defined rules.
In the User Awareness page you can turn the blade on or off and use the configuration wizard to configure sources to get user identities, for logging and configuration purposes.
User Awareness lets you configure the Check Point Appliance to show user based logs instead of IP address based logs and enforce access control for individual users and user groups.
To use User Awareness, you must configure identification methods to get information about users and user groups. After the gateway acquires the identity of a user, user-based rules can be enforced on the network traffic in the Access Policy.
User Awareness can use these sources to identify users:
AD Query
The Check Point Appliance registers to receive security event logs from the AD domain controllers when the security policy is installed. This requires administrator privileges for the AD server. When a user authenticates with AD credentials, these event logs are generated and are sent to the Security Gateway. The Check Point Appliance can then identify the user based on the AD security event log.
Browser-Based Authentication
Browser-Based Authentication uses a web interface to authenticate users before they can access network resources or the Internet. When users try to access a protected resource, they must log in to a web page to continue. This is a method that identifies locally defined users or users that were not successfully identified by other methods. You can configure the Browser-Based Authentication to appear for all traffic but because this method of identification is not seamless to the end users, it is commonly configured to appear when you access only specific network resources or the Internet to avoid the overhead required from end users when they identify themselves. For traffic that is not HTTP based, you can also configure that all unidentified are blocked from accessing the configured resources or Internet until they identify themselves first through the Browser-Based Authentication.
To turn on User Awareness on or off:
Select the On or Off option.
Note - When the blade is managed by Cloud Services, a lock icon is shown. You cannot toggle between the on and off states. If you change other policy settings, the change is temporary. Any changes made locally are overridden in the next synchronization between the gateway and Cloud Services.
Use the User Awareness configuration wizard to enable and configure the blade. You can configure the basic details of the identity sources. After initial configuration, you can select the Active Directory Queries or Browser-Based Authentication checkboxes under Policy Configuration and click Configure to configure more advanced settings.
To configure User Awareness with the wizard:
The User Awareness Wizard opens.
For Active Directory Queries:
If you have an existing Active Directory server, click Use existing Active Directory servers.
To add a new Active Directory Domain:
The Active Directory Queries window opens.
You can also add a new AD Domain in the Users & Objects > Authentication Servers page.
For Browser-Based Authentication:
To edit settings and configure portal customization for Browser-Based Authentication:
Configure the Guest Session timeout. This is the number of minutes for which a guest user can access network resources. The default timeout is 180 minutes.
Guest access is logged. The name of the guest shows in the User column of the Logs and Monitoring tab. The other details show in the full log entry.
Note - This page is available from Access Policy > User Awareness Blade Control and Users & Objects > User Awareness.
In the Access Policy > QoS Blade Control page you can activate QoS, define the QoS default policy, and add manual rules.
The QoS (bandwidth control) policy is a set of rules that lets you set bandwidth parameters to control the flow of communication to and from your network. These rules make sure that important traffic is prioritized so your business can work with minimum disruption when there is network congestion.
QoS can be activated on Internet connections and requires at least one Internet connection to be configured with the maximum download and/or upload speeds provided by your ISP. For more information about your download and upload speeds, contact your local ISP.
This page lets you configure a default simplified QoS policy. You can configure a more advanced policy in the Access Policy > QoS Policy page.
QoS policy applies to traffic over external interfaces only.
QoS
Select one of the options to set the Access Policy control level:
Note - When the blade is managed by Cloud Services, a lock icon is shown. You cannot toggle between the on and off states. If you change other policy settings, the change is temporary. Any changes made locally will be overridden in the next synchronization between the gateway and Cloud Services.
QoS default policy
Select the options for your default QoS policy. Alternatively, you can define your entire QoS policy through the Access Policy > QoS Policy page by clearing all of the checkboxes on this page.
Click the Delay Sensitive Services link to see the default services included and add new ones or remove existing if necessary. QoS tries to send these packets before other packets. This option adds a rule to the QoS Policy Rule Base.
Enter the bandwidth percentage, change the type of traffic if needed, and if necessary click the all services link to edit a list of selected guaranteed services. This option adds a rule to the QoS Policy Rule Base.
Click the Bandwidth Consuming Applications link to see the default applications/categories included and add new ones or remove existing if necessary.
Select the Limit Bandwidth Consuming Applications checkbox and select Download and/or Upload to determine where the limit is enforced and the maximum bandwidth in each of the selected options. Bandwidth consuming applications control can also be configured in the Access Policy > Firewall Blade Control and Policy pages.
To add a guaranteed service to the default policy:
The Edit guaranteed services window opens.
In the Access Policy > QoS Policy page you can manage the QoS default policy and add manual rules if necessary.
The top of the page shows information about these limits:
You can view the QoS Policy Rule Base on this page. For each rule, you see these fields:
Rule Base Field |
Description |
---|---|
No. |
Rule number in the QoS policy. |
Source |
Network object that starts the connection. |
Destination |
Network object that completes the connection. |
Service |
Type of network service for which bandwidth is adjusted based on weight, limit, and guarantee. |
Guarantee/Limit |
Lets you set a percentage that limits the bandwidth rate of traffic and/or guarantees the minimum bandwidth for traffic. Another option is to mark the traffic as low latency. This guarantees that it is prioritized accordingly. |
Weight |
The unit used to divide available bandwidth when traffic exceeds the maximum bandwidth configured for the Internet connection. See below. |
Track |
The tracking and logging action that is done when traffic matches the rule. |
Comment |
An optional field that shows a comment if you entered one. For system generated rules of the default policy a Note is shown. |
Weight
QoS divides available bandwidth across the QoS policy rules based on weight. The use of weights instead of specified percentages is a flexible way for the QoS engine to allocate bandwidth if the maximum bandwidth is exceeded based on the specified traffic at that point. This maximizes the usage of the bandwidth.
For example, in an organization, Web traffic is deemed three times as important as FTP traffic. Rules with these services are assigned weights of 30 and 10 respectively. If the lines are congested, QoS keeps the ratio of bandwidth allocated to Web traffic and FTP traffic at 3 to 1.
You can set options for the default policy or you can manually define rules for the QoS policy. If a rule does not use all of its bandwidth, the leftover bandwidth is divided with the remaining rules, based on their relative weights. In the above example, if only one Web and one FTP connection are active and they compete, the Web connection receives 75% (30/40) of the leftover bandwidth, and the FTP connection receives 25% (10/40) of the leftover bandwidth. If the Web connection closes, the FTP connection receives 100% of the bandwidth.
In the Weight field, enter a value that shows the services importance relative to other defined services. For example, if you enter a weight of 100 for a service and set 50 for a different service, the first service is allocated two times the amount of bandwidth as the second when lines are congested.
To create a QoS rule:
The Add Rule window opens. It shows the rule fields in two manners:
Note - You can select for a specified rule to have a specified guarantee and/or limit or be marked as low latency traffic. In case of the latter, there is a single maximum limit percentage for ALL low latency traffic which can be configured globally. See above.
Note - You can drag and drop rules to change the order of rules in the QoS Rule Base.
To edit a rule:
Note - For Access Policy rules, you can only edit the tracking options for automatically generated rules.
To delete a rule:
To enable or disable a rule:
To change the rule order:
Note - You can only change the order of manually defined rules.
SSL Inspection
The Access Policy > SSL Inspection Policy page lets you enable and configure SSL inspection. When you turn on this setting, you allow different Software Blades that support SSL inspection to inspect traffic that is encrypted by the Secure Sockets Layer (SSL) protocol. To allow the gateway to inspect the secured connections, all hosts behind the gateway must install the gateway CA certificate.
Software Blades that support SSL traffic inspection:
Deploying SSL Inspection
To deploy SSL inspection:
Note - The certificate is available for all users on the gateway. You do not need admin credentials. If you do not have admin credentials, connect from an internal or wireless network to http://my.filewall/ica
or https://Firewall_IP/ica
.
You must install this certificate on every client behind the gateway.
To install the certificate:
Note - This is not the default repository in the Certificate Import Wizard.
Certificate installation varies according to the OS. To learn how to install the certificate in your machine, see your OS vendor instructions.
SSL inspection uses the existing internal CA by default. To use your own certificate, you must replace the internal CA.
To replace the internal CA:
The Upload a P12 Certificate window opens.
SSL Inspection Bypass Policy
You can select categories that are bypassed for all possible traffic regardless of its source and destination. To configure more advanced exceptions, go to the SSL Inspection Exceptions page.
To set the SSL inspection bypass policy:
Note - Wireless networks must be assigned to Separate Network, not switch or bridge.
Note - These logs are generated in addition to the logs generated by the Software Blades.
To add other categories:
Note - The Bypass checkbox is selected by default.
The SSL Inspection Bypass Other window opens.
HTTPS Categorization
As an alternative to SSL inspection, you can enable HTTPS categorization. HTTPS categorization allows filtering specified HTTPS URLs and applications without activating SSL traffic inspection.
For more information, see the HTTPS Inspection video on the Small Business Security video channel.
To enable HTTPS categorization:
Note - When you enable HTTPS categorization, the SSL options are not available.
The Access Policy > Firewall Blade Control page opens.
Note - HTTPS categorization only applies when the URL Filtering blade is turned on.
To disable SSL inspection and HTTPS categorization:
Select Off.
IMAPS
Internet Message Access Protocol (IMAP) is an Internet standard protocol used by email clients to retrieve email messages from a mail server over a TCP/IP connection. IMAPS refers to IMAP over SSL.
SSL traffic inspection must be activated to scan HTTP and IMAP encrypted traffic.
To configure SSL Inspection to inspect the IMAPS protocol, click the checkbox.
On the SSL Inspection Exceptions page, you can define manual rules to configure exceptions to bypass SSL inspection for specific traffic. You can configure more advanced exceptions with specific scope, category, and tracking options.
To add bypass exceptions:
To enable SSL web traffic inspection, you must first establish trust between the clients and the gateway.
An important part of the HTTPS inspection support is the validation of the server's certificate. This requires validating the signing CA of the server certificates.
On the SSL Inspection Advanced page, you can manage trusted certificate authorities. The gateway has a built-in predefined list of trusted CAs, based on the Mozilla/LibCurl Trusted CA list. Only a server certificate signed by one of those CAs is recognized as a valid certificate. The table shows the list of trusted CAs.
Trusted CA types:
To manually add a CA to the trusted CA list:
The Add a Trusted CA window opens.
To delete a trusted CA:
Note - You can only delete a CA that was added by a user.
To disable/enable a trusted CA: