In This Section: |
This section describes how to set up and manage users (User Awareness, users, administrators, and authentication servers) and network resources.
In the User Awareness page you can turn the blade on or off and use the configuration wizard to configure sources to get user identities, for logging and configuration purposes.
User Awareness lets you configure the Check Point Appliance to show user based logs instead of IP address based logs and enforce access control for individual users and user groups.
To use User Awareness, you must configure identification methods to get information about users and user groups. After the gateway acquires the identity of a user, user-based rules can be enforced on the network traffic in the Access Policy.
User Awareness can use these sources to identify users:
AD Query
The Check Point Appliance registers to receive security event logs from the AD domain controllers when the security policy is installed. This requires administrator privileges for the AD server. When a user authenticates with AD credentials, these event logs are generated and are sent to the Security Gateway. The Check Point Appliance can then identify the user based on the AD security event log.
Browser-Based Authentication
Browser-Based Authentication uses a web interface to authenticate users before they can access network resources or the Internet. When users try to access a protected resource, they must log in to a web page to continue. This is a method that identifies locally defined users or users that were not successfully identified by other methods. You can configure the Browser-Based Authentication to appear for all traffic but because this method of identification is not seamless to the end users, it is commonly configured to appear when you access only specific network resources or the Internet to avoid the overhead required from end users when they identify themselves. For traffic that is not HTTP based, you can also configure that all unidentified are blocked from accessing the configured resources or Internet until they identify themselves first through the Browser-Based Authentication.
To turn on User Awareness on or off:
Select the On or Off option.
Note - When the blade is managed by Cloud Services, a lock icon is shown. You cannot toggle between the on and off states. If you change other policy settings, the change is temporary. Any changes made locally are overridden in the next synchronization between the gateway and Cloud Services.
Use the User Awareness configuration wizard to enable and configure the blade. You can configure the basic details of the identity sources. After initial configuration, you can select the Active Directory Queries or Browser-Based Authentication checkboxes under Policy Configuration and click Configure to configure more advanced settings.
To configure User Awareness with the wizard:
The User Awareness Wizard opens.
For Active Directory Queries:
If you have an existing Active Directory server, click Use existing Active Directory servers.
To add a new Active Directory Domain:
The Active Directory Queries window opens.
You can also add a new AD Domain in the Users & Objects > Authentication Servers page.
For Browser-Based Authentication:
To edit settings and configure portal customization for Browser-Based Authentication:
Configure the Guest Session timeout. This is the number of minutes for which a guest user can access network resources. The default timeout is 180 minutes.
Guest access is logged. The name of the guest shows in the User column of the Logs and Monitoring tab. The other details show in the full log entry.
Note - This page is available from Access Policy > User Awareness Blade Control and Users & Objects > User Awareness.
In the Users & Objects > Users page you can create local users and user groups. To use these objects in the Access Policy, make sure to activate User Awareness.
User objects are used to define the different terms under which users can operate. These include:
To add a new local user:
The password can be up to 100 characters.
Enter the expiration date and time.
The user is added to the table on the page.
To add a new local users group with remote access permissions:
You can see a summary of the group members above the user list.
The group is added to the table on the page.
To automatically delete expired local users:
The User Management window opens.
Expired local users are automatically deleted every 24 hours (after midnight).
To edit a user or group:
To delete a user or group:
The user or group is deleted.
The Device > Administrators page lists the Check Point Appliance administrators and lets you:
Administrators can also be defined in a remote RADIUS server and you can configure the appliance to allow them access. Authentication of those remotely defined administrators is done by the same RADIUS server.
Administrator Roles:
Two administrators with write permissions cannot log in at the same time. If an administrator is already logged in, a message shows. You can choose to log in with Read-Only permission or to continue. If you continue the login process, the first administrator session ends automatically.
The correct Administrator Role must be configured to perform the operations listed below. If not, a Permission Error message shows.
To create a local administrator:
The Add Administrator page opens.
The name and Administrator Role is added to the table. When logged in to the WebUI, the administrator name and role is shown at the top of the page.
To edit the details of locally defined administrators:
To delete a locally defined administrator:
Note - You cannot delete an administrator who is currently logged in.
To allow access for administrators defined in a remote RADIUS server:
The RADIUS Authentication window opens.
Use roles defined on RADIUS server is selected by default.
Note - A user without role definition will get a login error.
To set the Session Timeout value for both local and remotely defined administrators:
The Administrators Security Settings window opens.
Note - This page is available from the Device and Users & Objects tabs.
To connect the mobile application with the appliance for the first time:
The Connect Mobile Device window opens.
This generates a QR code to connect the Check Point WatchTower mobile application with the appliance for the first time.
For more information about the mobile application, see the Check Point SMB WatchTower App User Guide.
Configuring a RADIUS Server for non-local Check Point Appliance users:
Non-local users can be defined on a RADIUS server and not in the Check Point Appliance. When a non-local user logs in to the appliance, the RADIUS server authenticates the user and assigns the applicable permissions. You must configure the RADIUS server to correctly authenticate and authorize non-local users.
Note - The configuration of the RADIUS Servers may change according to the type of operating system on which the RADIUS Server is installed.
Note - If you define a RADIUS user with a null password (on the RADIUS server), the appliance cannot authenticate that user.
To configure a Steel-Belted RADIUS server for non-local appliance users:
checkpoint.dct
on the RADIUS server, in the default dictionary directory (that contains radius.dct
). Add these lines to the file:
|
vendor.ini
file on RADIUS server (keep in alphabetical order with the other vendor products in this file):
|
dictiona.dcm
file the line: “@
checkpoint.dct”
CP-Gaia-User-Role =
<role>
Where <role> allowed values are:
Administrator Role |
Value |
---|---|
Super Admin |
|
Read only |
|
Networking Admin |
|
To configure a FreeRADIUS server for non-local appliance users:
dictionary.
checkpoint
in /etc/freeradius/
on the RADIUS server:
|
/etc/freeradius/dictionary
the line: “$INCLUDE dictionary.
checkpoint”
CP-Gaia-User-Role =
<role>
Where <role> is the name of the administrator role that is defined in the WebUI.
Administrator Role |
Value |
---|---|
Super Admin |
|
Read only |
|
Networking Admin |
|
To configure an OpenRADIUS server for non-local appliance users:
dict.
checkpoint
in /etc/openradius/subdicts/
|
$include subdicts/dict.
checkpoint
/etc/openradius/dictionaries
dict.ascend
CP-Gaia-User-Role =
<role>
Where <role> is the name of the administrator role that is defined in the WebUI.
Administrator Role |
Value |
---|---|
Super Admin |
|
Read only |
|
Networking Admin |
|
To log in as a Super User:
A user with super user permissions can use the Check Point Appliance shell to do system-level operations, including working with the file system.
Expert
In the Authentication Servers page you can define and view different authentication servers where users can define both an external user database and the authentication method for users in that database.
You can define these types of authentication servers:
To add a RADIUS server:
Note - If you want to remove information you entered in IP address and shared secret, you can click Clear.
The primary and secondary servers (if defined) are added to the RADIUS section on the page.
RADIUS servers can be used for:
To edit a RADIUS server:
The changes are updated in the RADIUS server.
To delete a RADIUS server:
Click the Remove link next to the RADIUS server you want to delete.
To configure remote access permissions for users defined in the RADIUS server:
To add an Active Directory domain:
The Add new Domain window opens.
When an Active Directory is defined, you can select it from the table and choose Edit or Delete when necessary.
When you edit, note that the Domain information is read-only and cannot be changed.
When you add a new Active Directory domain, you cannot create another object using an existing domain.
To configure remote access permissions for all users defined in Active Directory:
By default, users defined in the Active Directory are not given remote access permissions. Instead, in the VPN > Remote Access Users page all users defined locally or in Active Directories can be selected to be granted remote access permissions per user.
Note that most Active Directories contain a large list of users and you might not want to grant them all remote access permissions to your organization. Usually you keep the Selected Active Directory user groups option and configure remote access permissions through VPN > Remote Access Users page.
To change synchronization mode with the defined Active Directories:
To edit an Active Directory:
To delete an Active Directory:
The Active Directory is deleted.
Note - This page is available from the VPN and Users & Objects tabs.
In the Users & Objects > Applications & URLs page you can define application groups, custom applications, and view the full list of available applications. You can then use them in the access policy together with the applications and URLs that are in the Application Database. A custom application group lets you define multiple categories and/or sites to use in the access policy Rule Base.
To configure the access policy, click the applications default policy link or click the Applications Blade Control page link.
For more information about all built in applications and categories, click the Check Point AppWiki link at the top of the page.
Note - When URL Filtering is selected in the Access Policy > Firewall Blade Control page, rules containing URLs and custom applications are enforced.
What is a custom application?
Most applications are browser based. A custom application can be defined using a string or regular expression search on URLs.
What is a category?
Each URL is inspected by the Check Point Cloud using the URL Filtering blade and can be matched to one or more built in categories (for example, phishing sites, high bandwidth, gambling, or shopping, etc.).
The Application and Categories List
A list of applications and categories is shown according to a filter that is shown above the list. There are 4 filters:
A tag icon is shown next to categories and dedicated application icons are shown next to applications.
In the Application Database, each application is assigned to one primary category based on its most defining aspect. It also has additional categories which are characteristics of the application. For example, Pinterest - its primary category is social networking and its additional categories are share photos and SSL protocol. If a category is in a rule, the rule matches all applications that are marked with the category.
If new applications are added to an additional category that is in the access policy Rule Base, the rule is updated automatically when the database is updated.
To search for a category or application:
As you type, the list is filtered.
To create a custom URL:
You can use the URL in a rule.
To create a custom application:
You can use the application in a rule.
To create a custom applications group:
The group members window shows a quick view of the selected items. You can quickly remove a selected item by clicking the x next to it.
You can use the custom application group in a rule.
The Users & Objects > Services page lists the system services configured in the system. In this page you can add new services, edit services, and delete services.
You use service objects to easily define the different network protocols. This is usually with IP protocol and ports (used by the TCP and UDP IP protocols).
These objects can be used to define your security policy, as well as policy based routing rules. Many service objects are predefined with the system and cannot be deleted. Those predefined "system services" represent the appliance's ability to perform deep inspection on those services for connectivity and security reasons. The system services sometimes have additional configuration options.
To create a new service:
General
Connection handling
Aggressive aging
This feature can be configured from the Device > Advanced page. When the appliance is under load, older connections are removed from memory faster to make room for new connections.
To edit a service:
To delete a service:
To filter for a specified service:
Built-in System Services
Some built-in services represent Check Point's ability to perform deep inspection of the specific protocol. These system services cannot be deleted. When you edit them, the ports which you configure decide when the deep inspection occurs and you can add or change default ports. Some system services have additional configuration which affect the way the deep inspection is performed.
The Users & Objects > Service Groups page lists the service groups defined in the system. In this page you can add new service groups, and edit or delete existing service groups.
We recommend you define service groups to configure the security policy. If the security policy is configured with groups and not specified objects, it is much easier to maintain the policy over time. If you decide to add new service objects to the system, you only need to add them to the relevant groups and your policy automatically applies.
There are built in service groups for common services.
Some of these service groups also contain additional configuration for the inspection of the specific protocol.
To create a new service group:
The New Service Group window opens.
The New Service Group window opens and shows the services you selected.
The service group is added to the list of groups.
To edit a service group:
To delete a service group:
To filter for a specified service group:
Built-in System Service Groups
Some built-in service groups represent Check Point's ability to perform deep inspection of a specific protocol. Such system service groups cannot be deleted. They contain a list of built in services which you can restore if you edit the content of such groups by clicking Reset.
Some system service groups have additional configuration which affect the way the deep inspection is performed.
DNS - The Firewall settings tab lets you configure NAT support over DNS. Note that this option affects the performance of DNS traffic and is normally not needed unless your organization uses both NAT and an internal DNS server accessible to the Internet. The IPS settings tab lets you configure how and when DNS deep inspection is performed. Select the relevant options.
The Users & Objects > Network Objects page lists the network objects defined in the system. In this page you can add new network objects, edit network objects, and delete network objects. In most cases, the most common use for these objects is to define a security policy and exceptions to it. These objects can be used as hosts for the internal DNS service and their IP addresses can be configured as fixed for the internal DHCP service.
These are the available network object types:
To create a Single IP network object:
The New Network Object window opens.
To create an IP Range network object:
The New Network Object window opens.
To create a Network type network object:
The New Network Object window opens.
To edit a network object:
To delete a network object:
To filter for a specified network object:
The Users & Objects > Network Object Groups page lists the network object groups defined in the system. In this page you can add new network object groups, edit network object groups, and delete network object groups.
We recommend you define groups for network objects to configure the security policy. If you configure security policy with groups and not specified objects, it is much easier to maintain the policy over time. When new network objects are added to the system, you only need to add them to the relevant groups and your policy automatically applies.
To create a new network object group:
The New Network Object Group window opens.
The New Network Object Group window opens and shows the services you selected.
The network object group is added to the list of groups.
To edit a network object group:
To delete a network object group:
To filter for a specified service group: