LTE
LTE is supported on Gaia Security Gateways of R77.30 and higher, and requires the R77.30 Add-On (see sk105412) on the Security Management Server or Multi-Domain Server.
Configuring Fragmentation for IPSec Traffic
To make sure the size of the transmitted packets is less than the MTU size, configure fragmentation for IPSec traffic.
To configure fragmentation for IPSec traffic:
- On the management server (Security Management Server or Multi-Domain Server) command line, run
dbedit in Expert mode. - At the dbedit prompt, run:
modify network_objects gateway_object VPN:ipsec_fragment_inner true
- Enter -
q to close dbedit. - Reboot the server.
- Install policy.
To configure fragmentation for IPSec traffic when using Performance Pack:
- On each Security Gateway, open the file
$PPKDIR/boot/modules/simkern.conf in a text editor. NOTE: If the file does not exist, create it.
- Add this line:
vpn_f2f_for_fragmentation=1 - Save and close the file.
- Reboot the gateway.
Configuring Subnet Range Selection for Quick Mode IDs
In Quick Mode, you can apply the subnet range selection specified through max_subnet_for_range to the ID of the local gateway, to a peer's ID, to both, or to none.
To configure the subnet range selection for Quick Mode IDs:
On each Security Gateway, run this command:
fw ctl set int < subnet_for_range_control> [0|1|2|3] VPN
These are the options for the subnet_for_range_control value:
0
|
max_subnet_for_range table is ignored on both sides.
|
1
|
max_subnet_for_range table is ignored when own source IDs are selected.
|
2
|
max_subnet_for_range table is ignored when peer’s destination IDs are selected.
|
3
|
The default: max_subnet_for_range table is never ignored.
|
Configuring Alternate CRL Distribution Points
For a CA domain, with certificate revocation information distributed to CRL Distribution Points, configure each CA to access these Distribution Points.
To configure alternate CRL Distribution Points for a CA server:
- On the management server (Security Management Server or Multi-Domain Server) command line, run
dbedit in Expert mode. - At the dbedit prompt, run this command for each CA:
addelement servers < ca_server_name> forced_crl_dp < Distribution_Point_URL>
Example: addelement servers MyCA forced_crl_dp http://mydomain.com/crlfile1.CRL
- Enter -
q to close dbedit. - Reboot the server.
- Install policy.
NOTE: You can assign several CRL DPs for each CA server.
Configuring Fail Open When CRL is Unavailable
By default, if a CRL is unavailable, the VPN connections that rely on it for the certificate verification shut down. To maintain network availability during a CRL failure, you can configure the Fail-Open mode on the gateways.
To configure Fail-Open:
- On the management server (Security Management Server or Multi-Domain Server) command line, run
dbedit in Expert mode. - At the dbedit prompt, run:
modify network_objects gateway_object VPN:ike_fetch_crl_fail_open true
- Enter -
q to close dbedit. - Reboot the server.
- Install policy.
|
Note - In Fail-Open mode, if the CRL is not available or is not readable, the certificate is not examined for possible revocation.
|
Configuring Persistent VPN Kernel Parameters
If you change VPN kernel parameters (usually with fw ctl set ), they return to their default values after reboot. If you configure persistent VPN kernel parameters, those changes stay.
To configure persistent VPN kernel parameters:
- On the Security Gateway, create this file:
$FWDIR/modules/vpnkern.conf - Add the required parameter(s) to
vpnkern.conf . - Example:
subnet_for_range_control=2 - Save the file.
- Reboot the gateway.
Disabling IKEv2 Traffic Selector Narrowing
During IKEv2 SA negotiation, the responder can narrow the traffic selector proposed by the initiator. You can disable this feature.
To disable IKEv2 Traffic Selector Narrowing with dbedit:
- On the management server (Security Management Server or Multi-Domain Server) command line, run
dbedit in Expert mode. - At the dbedit prompt, run:
modify network_objects gateway_object VPN:ikev2_accept_all_ts true
- Enter -
q to close dbedit. - Reboot the server.
- Install policy.
Configuring the GTP Signaling Rate Limit
The Security Gateway calculates the maximum signal rate. It multiplies the value of and the value of . To configure the GTP signaling rate, configure these properties.
To configure GTP signaling rate limit:
- Create one or more groups of source network objects.
- In SmartDashboard, right-click and select > .
- In the window enter:
- - Unique character string identifier
- (optional) - Descriptive text
- (optional) - Select a color for the group icon
- Select and enter an integer value (in PDU/sec).
- From the list, double-click the network objects to be included in the group.
- Click .
- Configure the sampling interval.
- In SmartDashboard, click .
The window opens.
- In the navigation tree, click .
- Enter an integer for (in seconds).
Default = 1 second.
- Click .
- Install policy.
Configuring GTPv2 Support
You can create rules with GTPv2 protocol services for S5/S8 LTE interfaces. You can use these new GTPv2 services in the column of rules.
|
Note - There is no service template for the service. You must manually create the template.
|
To create a GTPv2 service (Not including Path Management):
- In SmartDashboard, go to the tab and select the tree.
- Right-click and select .
- Select a service template from the options menu:
- – for Tunnel Management service
- – for Mobility Management service
- – Custom defined service
- In the window, enter a name for the new service.
- If you selected the service, select one or more service types:
|
Note - GTP-U messages cannot match GTPv2 services in Firewall rules. You must also include the GTPv1 service in the rule to match GTP-U messages.
|
To create the Path Management GTPv2 service:
- On the tab, right click .
- Right-click > .
- In the window, enter this string as the service name:
gtpv2_path_mgmt
- Enter
17 in the field. - Click .
- In the window, enter this string in the field:
gtp_path_match_v2
- Select the option.
Configuring SCTP Inspection
When a Carrier license is installed, you can specify SCTP services in your Firewall rules. SCTP Inspection occurs in these cases:
- There is a match on a rule containing an SCTP or Diameter SCTP service in the cell.
- There is a match on a rule with = and this SCTP service has selected.
To activate SCTP Inspection:
- Open SmartDashboard > .
- Click > > .
The s window opens.
- - The name of the service. The name assigned here must be the same as the server service name (as in the services file). If NIS is used, the firewall automatically retrieves the information from NIS.
- - The number of the port that gives this service.
- - If the connections are not allowed in the new policy, they are still kept. This overrides the settings in the Connection Persistence page. If you change this property, the change does not have effect on open connections, but only future connections.
- Click .
The window opens.
- - Port number for the client side service. If specified, only those Source port Numbers will be Accepted, Dropped, or Rejected during packet inspection. Otherwise, the source port is not inspected.
- - Sets short (aggressive) timeouts for idle connections. When a connection is idle for more than its aggressive timeout value, it is marked as eligible for deletion. When memory consumption or connections table capacity exceeds a user-defined threshold (high watermark), aggressive aging starts. Each incoming connection starts to delete k (10 by default) connections that are eligible for deletion. This continues until memory consumption or connections capacity decreases below the low value.
- - Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster. Of the services allowed by the Rule Base, only those with selected are synchronized as they go through the cluster. By default, all new and existing services are synchronized.
- Click .
- Open > .
Configure these options:
Option
|
Meaning
|
SCTP start timeout
|
- An SCTP connection times out if the interval between the arrival of the first packet and establishment of the connection (STCP four-way handshake) exceeds the SCTP start timeout in seconds.
- Attribute name in GuiDBedit:
sctpstarttimeout
|
SCTP session timeout
|
- Length of time an idle connection remains in the Security Gateway connections table.
- Attribute name in GuiDBedit:
sctptimeout
|
SCTP end timeout
|
|
Option
|
Meaning
|
Drop out of state SCTP packets
|
- Drop SCTP packets that are not consistent with the current state of the SCTP connection.
- Attribute name in GuiDBedit:
fw_drop_out_of_state_sctp
|
Log on drop
|
- Generates a log entry when out of state SCTP packets are dropped.
- Attribute name in GuiDBedit:
fw_log_out_of_state_sctp
|
To deactivate out of state packet drop with SmartDashboard:
- In SmartDashboard, go to .
- Clear the option.
- Save and install the policy.
To deactivate packet inspection with GuiDBedit:
- Open GuiDBedit.
- Search for:
fw_sctp_packet_inspection . - Set the property to .
- Save the database and install policy.
Configuring SCTP Acceleration
To enable SCTP acceleration:
sim feature sctp on
To disable SCTP acceleration, run: sim feature sctp off
Note: If SCTP acceleration is activated and SCTP inspection is deactivated, the Performance Pack accelerates all SCTP packet types.
Configuring SCTP NAT
SCTP NAT overrides the defined NAT policy. When this feature is not activated, SCTP connections do not use NAT.
To activate SCTP NAT:
On the Security Gateway, run: fw ctl set int fwx_enable_sctp_nat 1
To deactivate SCTP NAT: fw ctl set int fwx_enable_sctp_nat 0
Configuring GSN Handover Group Limits
You can specify tunnel limits, for GTP handover groups. A newly created tunnel counts against the limit for handover groups on both sides of the tunnel.
To configure GSN handover group limits:
- Run and connect to the management server.
- Search for and set the value to .
Search for and set the value to an integer that defines the percentage (0 - 100) of the tunnel capacity assigned to all handover groups.
The default value is 0 (unlimited).
This percentage applies to all groups for which no limit is defined explicitly.
- Search for .
This parameter is the maximum number of GTP tunnels that a handover group can create. Set this limit to make sure that one group does not take too much of the GTP tunnel allowance.
- Search for in each handover group.
This value is an integer that defines the maximum number of tunnels that can be open for the specified group. The default value is 0 (not defined).
The explicitly defined has precedence over the definition.
Monitoring GSN Handover Group Limits
This command shows tunnel use for handover groups. Run it in Expert mode on the Security Gateway.
Syntax
fw gtp ho_groups {-g <name> | -l} [-m <lines>] [-s { name | tunnels | limit | util } [-r]]
Parameter
|
Description
|
-g < name>
|
Show only the specified handover group
|
-l
|
Show only the handover group names (no data)
|
-m < lines>
|
Show, at most, the specified number of lines
|
-s
|
Sort the output by tunnel name, assigned limit or tunnel utilization
|
-r
|
Sort the output in in reverse alphabetical order
|
Example
# fw gtp ho_groups
Name Open tunnels Limit %Utilization
------------------------------- ------------ ---------- ------------
Operator-6-GSNs 25000 100000 25
Operator-9-GSNs 33148 50000 66
Operator-3-GSNs 380 no limit n/a
Operator-8-GSNs 15897 200000 7
Operator-5-GSNs 84125 180000 46
Operator-4-GSNs 0 50000 0
Operator-1-GSNs 45000 45000 100
Operator-7-GSNs 69716 70000 99
Operator-2-GSNs 394326 500000 78
Deactivating Session Hijacking Protection
The Session Hijacking protection is turned on by default. You can deactivate it with one command.
To deactivate the Session Hijacking protection, run this command on the Security Gateway in Expert mode:
# fw ctl set int gtp_allow_ho_bypass 1
To re-activate Session Hijacking protection, run:
# fw ctl set int gtp_allow_ho_bypass 0
Using Diameter Services in Rules
Diameter inspection rules examine traffic for Diameter application compatibility and compliance with the applicable protocols. If the inspection detects an error or incompatibility, the traffic is always dropped.
You can create Firewall rules that inspect Diameter traffic based on matching Diameter services. Each Diameter service is related to a Diameter application, which must support the Diameter base protocol. This release includes some predefined Diameter applications. You can create your own custom Diameter applications as necessary.
You must define Diameter services for use in rules. You can define services for Diameter over SCTP or Diameter over TCP.
Notes and Limitations:
- All Diameter inspection rules must use the action. Do not use the or actions, because this can cause valid Diameter traffic to be dropped.
- You can include Diameter SCTP and Diameter TCP services in the same rule, or create different rules for each.
- When a rule has same source and destination objects, you must include all applicable Diameter services in one rule. You cannot use more than one rule with the same source and destination for different Diameter services. This can cause valid Diameter traffic to be dropped.
Creating Diameter SCTP Services
To Create a Diameter SCTP Service:
- Open .
- On the tab, open objects tree.
- Right-click .
- Select .
The window opens.
- - The name of the service. The name assigned here must be the same as the server service name (as in the services file). If NIS is used, the firewall automatically retrieves the information from NIS.
- - Optionally enter a comment.
- - Select a color.
- - Select a Diameter application. If the required application is not in the list, you can create a new one.
- - Overrides the settings defined on the page. If you change this parameter, the change does not apply to existing open connections.
- Click .
The window opens.
- Configure these parameters.
- - Port number for the client side service. If specified, only those Source port Numbers will be Accepted, Dropped, or Rejected during packet inspection. Otherwise, the source port is not inspected.
- - Sets short (aggressive) timeouts for idle connections. When a connection is idle for more than its aggressive timeout value, it is marked as eligible for deletion. When memory consumption or connections table capacity exceeds a user-defined threshold (high watermark), aggressive aging starts. Each incoming connection starts to delete k (10 by default) connections that are eligible for deletion. This continues until memory consumption or connections capacity decreases below the low value.
- - Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster. Of the services allowed by the Rule Base, only those with selected are synchronized as they go through the cluster. By default, all new and existing services are synchronized.
- Click two times to close the windows.
See the Rule limitations. Use SmartView Tracker to see connections that use SCTP services.
Creating Diameter TCP Services
To Create a Diameter TCP Service:
- Open .
- On the tab, open objects tree.
- Right-click .
- Select .
The window opens.
- - The name of the service. The name assigned here must be the same as the server service name (as in the services file). If NIS is used, the firewall automatically retrieves the information from NIS.
- - Optionally enter a comment.
- - Select a color.
- - Select a Diameter application. If the required application is not in the list, you can create one.
- - Overrides the settings defined on the page. If you change this parameter, the change does not apply to existing open connections.
- Click .
The window opens. Configure these parameters.
- - Port number for the client side service. If specified, only those Source port Numbers will be Accepted, Dropped, or Rejected during packet inspection. Otherwise, the source port is not inspected.
- - Enables the TCP service for a TCP Resource.
- . - If selected, this service is used when 'Any' is set for the rule's service and there are several service objects with the same source port and protocol.
- - Time (in seconds) before the session times out.
- - Use the default value defined on the Stateful Inspection page in .
- - Manually define a timeout period for this service.
- - Sets short (aggressive) timeouts for idle connections. When a connection is idle for more than its aggressive timeout value, it is marked as eligible for deletion. When memory consumption or connections table capacity exceeds a user-defined threshold (high watermark), aggressive aging starts. Each incoming connection starts to delete k (10 by default) connections that are eligible for deletion. This continues until memory consumption or connections capacity decreases below the low value.
- - Enables state synchronization on a ClusterXL or OPSEC-certified cluster.
- - All traffic inspection for a connection is done by the same cluster member. This option makes for better connection stickiness.
- Click two times to close the windows.
See the Rule limitations.
Creating Diameter Applications
You can create custom Diameter applications to use in Diameter services. Custom Diameter applications are typically related to an RFC. Each application includes one or more Diameter commands.
|
Note - This advanced feature is complex and requires detailed knowledge of the Diameter protocols. We recommend that you coordinate use of this feature with Check Point support.
|
To create a Diameter application:
- Open .
- On the tab open and select .
- Click in the pane.
- Click .
The window opens.
- - select .
- - enter the name of the new application.
- Click .
The new object is added to list of objects and its fields show in the bottom pane of .
- In column (in the lower pane in the window):
- Double-click .
The window opens.
- Select an application command from the list.
If the command does not exist, create it. Repeat steps a. and b. as necessary to add more application commands.
- Double-click .
The window opens.
- Enter a value for the application id.
The must be the same id as in the RFC for this application.
- Double-click
. Make sure the value is , unless you want to block some application commands.
- Double-click
. Make sure the value is .
- Save and close GuiDBedit.
In SmartDashboard, the new application shows in the window. You must restart SmartDashboard before you can use the new service in a policy rule.
Creating Diameter Application Commands
A Diameter application includes one or more commands. There are default commands, and you can create new request or answer commands.
|
Note - This advanced feature is complex and requires detailed knowledge of the Diameter protocols. We recommend that you coordinate use of this feature with Check Point support.
|
To create a Diameter application command:
- In , click in the column.
- Click .
The window opens.
- From select .
Note - is not a valid option creating Diameter Application commands. The diameter_avp option is used only for creating diameter_avp objects and is not enforced by the policy.
- In the field, enter a name for the new command.
- Use the application command names as defined by the applicable RFC.
- Select the request or answer command as necessary. For example, or .
- Click .
The new command shows in the table.
- Select the new command.
- In the table:
- Double-click .
In the window, enter the value specified by the related RFC.
Click .
- Double-click .
In the window, enter the value specified by the related RFC (a three-letter code, for example NCR or NCA).
Click .
- Double-click .
In the window, select or :
- Application request commands must be .
- Application answer commands must be .
- Click .
- On the toolbar, click the button.
|
Important - You must save new commands before you can add them to a diameter application.
|
Blocking Specified Application Commands
You can create a service for an application that excludes specified commands. This lets you use a Diameter rule to block traffic that uses the specified commands.
|
Note - This advanced feature is complex and requires detailed knowledge of the Diameter protocols. We recommend that you coordinate use of this feature with Check Point support.
|
In a Diameter application, the value is typically set to . To block commands allowed by the base protocol:
- Create a custom Diameter application with an ID that is not related to an RFC.
- Add only the commands to be allowed.
- Set the property to .
- Create a new service that uses the new custom Diameter application, for SCTP or TCP inspection.
- Add the new to a Diameter rule.
- Install policy.
Notes and limitations:
- Make sure the source and destination Diameter nodes use the custom application. If not, the rule will not exclude the blocked application commands because it will use the standard RFC based application.
- All Diameter rules must have the property set to the same value - . If not, the rule will not exclude the blocked application commands because it will use the standard RFC based application.
Sending Check Point Logs to a Syslog Server
By default, gateway logs are sent to the Security Management Server. You can configure gateways to send logs directly to syslog servers. First, define syslog servers. Then, update the logging properties of the gateways.
These syslog protocols are supported:
- RFC 3164 (old)
- RFC 5424 (new)
Limitations
- IPv6 logs are not supported
- Software Blade logs are not supported
Defining Syslog Servers
To define a Syslog server:
- In SmartDashboard, click the tab.
- In the object tree, right-click .
- In the window, enter or select:
- Name
- Optional comment
- Host
- Port (Default = 514)
- Version (BSD Protocol or Syslog Protocol)
<81>Jul 25 17:26:49 172.23.22.63 Action="accept" src="91.90.139.74" dst="172.23.22.63" proto="17" product="VPN-1 & FireWall-1" service="1147" s_port="26666" product_family="Network"
|
Example of a Syslog Protocol log entry (truncated):
<81>1 2012-07-25T17:17:50Z 172.23.22.63 CP-GW - Log [Fields@1.3.6.1.4.1.2620 Action="accept" rule="1" src="91.90.139.74" dst="172.23.22.63" proto="17" product="VPN-1 & FireWall-1" service="1052" s_port="54444" product_family="Network"]
|
Configuring Gateways to Send Logs to Syslog Servers
You can configure a gateway to send logs to multiple syslog servers. The syslog servers must be the same type: BSD Protocol or Syslog Protocol.
To send the logs of a gateway to syslog servers:
- In SmartDashboard, go to > .
- In the table, click the green button to add syslog servers.
Note - You cannot configure a Syslog server as a backup server.
- Click .
- Install policy.
Enabling Syslog in Kernel
The fwsyslog_enable kernel parameter enables or disables the feature:
= Disabled (default)
= Enabled
You can enable or disable Syslog in Kernel temporarily (until the system reboots) or permanently (until manually disabled).
To temporarily enable Syslog in Kernel on a Security Gateway:
- Run:
# fw ctl set int fwsyslog_enable 1 - Install Policy.
To permanently enable Syslog in Kernel on a Security Gateway:
- Run:
echo fwsyslog_enable=1 >> $FWDIR/modules/fwkern.conf
- Reboot the Security Gateway or cluster members.
To disable Syslog in Kernel temporarily:
Run: # fw ctl set int fwsyslog_enable 0
To disable Syslog in Kernel permanently:
- Open
$FWDIR/modules/fwkern.conf in a text editor and do one of these actions:- Set
fwsyslog_enable=0 or
- Delete the
fwsyslog_enable line.
- Reboot the Security Gateway.
Verification
To see the Syslog in Kernel status:
[Expert@host:0]# fw ctl get int fwsyslog_enable
You can see the count of logs sent to syslog from the kernel. Log counters start when you install the policy.
To see log count for an instance:
[Expert@host:0]# fw -i <instance_number> ctl get size fwsyslog_nlogs_counter
Sample output:
fwsyslog_nlogs_counter = 21
To see log count for all instances:
- Open two command line connections to the Security Gateway.
- On the first CLI connection, run:
# fw ctl zdebug - On the second CLI connection, run:
# fw ctl set size fwsyslog_print_counter 1 - On the first shell, see the counter for each instance and the sum of all instances.
Sample output:
;[cpu_2];[fw4_0];Number of logs sent from instance 0 is 43;
;[cpu_2];[fw4_0];Number of logs sent from instance 1 is 39;
;[cpu_2];[fw4_0];Number of logs sent from instance 2 is 50;
;[cpu_2];[fw4_0];Total fwsyslog_nlogs_counter = 132;
Configuring CGNAT
To configure CGNAT objects:
- In SmartDashboard, create a subscriber.
You can use one network object to handle traffic for one subscriber or for many subscribers.
- In the window - tab, enter the IPv4 address and subnet mask in the applicable fields.
- Configure other properties as necessary.
- Create a subscriber .
- If you cannot define the hide range with one continuous address range, you must divide the subscriber networks into subnets and then create different CGNAT rules for each network segment.
To create a CGNAT Rule:
- In the pane, create a new rule.
- Right-click the - cell and select .
- In the window, select the subscriber.
- In the - cell, select the subscriber .
- Move the cursor over the - cell to see the number of ports for each subscriber.
Important- If the calculated number of ports per subscriber is less than 10, a warning message shows. If this occurs, increase the number of addresses in the hide range.
- Install Policy.
CGNAT Rule Notes
- Use only IP address range objects for the translated source.
- Do not change the destination and service cell default values.
- Do not use overlapping IP addresses in rules. When rules include overlapping IP address ranges, only the first occurrence of the overlapping address is used.
For example, if:
Rule 1 uses ip-range: 10.10.10.1-50 Rule 2 uses ip-range: 10.10.10.30-100
Then:
Rule 1 is applicable to the full range (10.10.10.1-50).
Rule 2 is applicable only to the sub-range (10.10.10.51-100).
Tracking CGNAT Rule Activity
To use CGNAT to identify the original subscriber IP address:
- Run SmartLog.
- Use this query for the address/port combination.
hide_ip:<public ip> and hide_port:<public port number>
For example, hide_ip:10.1.1.10 and hide_port:38200 .
- Click a record to see the original subscriber IP address.
Configuring Stateful NAT64
Before you define NAT64 rules:
- For embedded NAT64, define an network object with an IPv4 range.
This range must be routable and not in use on the IPv4 side of the network. We recommend that you define a large range for more concurrent NAT64 connections.
- Define IPv6 network objects for your IPv4 hosts:
- You can define IPv4 embedded IPv6 addresses for servers, IP address ranges and network objects.
- You can define static IPv6 addresses for servers and other 'simple' host objects.
Defining a NAT64 Rule
Define NAT64 rules as Manual NAT rules in the NAT policy view. Make sure that you add firewall security rules that allow NAT traffic.
Use the standard procedure for NAT rules, with these differences:
- The cell must contain an IPv4 hide range.
- The cell must contain one of these:
- A supported network object with an IPv4-embedded IPv6 address
- A host object with one, static IPv6 address
- You must set the to . Right-click the and select > .
Notes:
When you set the to :
- The cell shows .
- A icon shows in the and cells.
- You can change the contents of the cell if the is also a host object. The cell contents can only contain host objects with IPv4 addresses.
- An icon with an shows that the cell contains a 1:1 static address translation of the destination.
- Make sure the gateway interface to the IPv4 network is configured correctly:
- There is an IPv6 address assigned to this interface.
- The network prefix length is equal to or less than 96.
- The Security Gateway routing table sends traffic for the original IPv6 destination (as defined by the NAT rule) to the IPv4 interface.
Other Settings
To configure NAT64 translation RFC 6052 compliant settings, open: > > >
We recommend that you change the default settings only if you are familiar with the technology.
(Activated by default) - This setting copies the to the field, and sets the field in the translated packet to zero.
(Deactivated by default) - Allows packet fragmentation on the IPv4 (destination) side during PMTU discovery. Activate this setting if some equipment combinations cause PMTU discovery to fail.
(Deactivated by default) - Lets the translator calculate and add a valid UDP checksum value to a packet if the packet checksum value is zero. This is important because, by default, an IPv4 UDP packet with a checksum value of zero is dropped on the IPv6 side.
Gateway Configuration
Make sure the number of IPv6 firewall instances is equal to the number of IPv4 firewall instances.
Logging
Source and destination IP addresses show in their original IPv6 format. To identify a NAT64 entry, look in the section of the window.
- Source hide IPv4 address
- Destination embedded IPv4 address
- Identifies the entry as NAT64 traffic
Large Scale VPN
A VPN that connects branch offices, worldwide partners, remote clients, and other environments, can reach hundreds or thousands of peers. A VPN on this scale brings new challenges. For example, when a new peer is deployed in production, you must define the peer and configure the environment again. Every time a new peer is deployed, you must Install Policy on all the Security Gateways.
The Large Scale VPN (LSV) feature addresses these challenges to deploy more easily and quickly. LSV is supported in R77.30 and higher.
Configuring LSV
To configure Large Scale VPN:
- If necessary, create a Trusted CA object in SmartConsole for the CA server that signs LSV peer certificates.
- In SmartConsole, right-click > and select .
- In the window > page, enter a unique name for the LSV Profile.
- Select a Certificate Authority () to sign peer certificates from the list.
A CA can sign for only one LSV profile.
- In the tab, add VPN communities.
- Optional: In the tab, define limitations for LSV peers:
- - Set the maximum number of IP addresses in the VPN domain.
- - All IP addresses can be included in the VPN domain.
- - Include only the selected groups or networks in the peer domain.
- Click .
The LSV Profile is under > .
Open SmartDashboard > > . Double-click the community to which you added the LSV profile, and make sure it is listed with the gateways.
- Install policy.
Monitoring LSV Peers and Tunnels
You can monitor LSV peers on a Security Gateway with the vpn lsv command.
- From the Security Gateway command line, run:
vpn lsv - Select an option.
********** Select Option **********
(1) List all LSV peers
(2) Show LSV peer's details
(3) Remove an LSV peer
(4) Remove all LSV peers
(Q) Quit
************ *******************************
You can also monitor LSV tunnels with SmartView Monitor.
Configuring New GTPv2 Message Types and Information Elements
This release lets you add user defined message types and information elements for GTPv2.
- gtpv2_ignore_messages - for unknown message types
- gtpv2_ignore_elements - for unexpected information elements
The GTPv2 protocol supports user defined information elements (ies) and message types. You can configure Firewall-1 GX to identify these items as legitimate traffic.
To configure Firewall-1 GX to allow these message types and information elements, add these lines to $FWDIR/lib/gtp.def on the management server:
gtpv2_ignore_messages = {< new_message_types>}; gtpv2_ignore_elements = {< new_information_element_types>};
Example:
gtpv2_ignore_messages = {224,233,251}; gtpv2_ignore_elements = {99,101,103};
Message types 224,233,251 and information elements 99,101,103 are allowed by gateway.
|