Print Download PDF Send Feedback

Previous

Next

Security Management Overview

In This Section:

Introduction

Logging In

Using SmartDashboard

Secure Internal Communication (SIC)

Introduction

To make the most of Check Point products and all their capabilities and features, become familiar with some basic concepts and components. This is an overview of usage, terms, and tasks to help you manage your Check Point Security Gateways.

Deployments

Basic deployments:

Typical Deployment

Assume an environment with gateways on different sites. Each Security Gateway connects to the Internet on one side, and to a LAN on the other.

You can create a Virtual Private Network (VPN) between the two Security Gateways, to secure all communication between them.

The Security Management server is installed in the LAN, and is protected by a Security Gateway. The Security Management server manages the Security Gateways and lets remote users connect securely to the corporate network. SmartDashboard can be installed on the Security Management server or another computer.

There can be other OPSEC-partner modules (for example, an Anti-Virus Server) to complete the network security with the Security Management server and its Security Gateways.

Management Software Blades

Software Blades are independent and flexible security modules that enable you to select the functions you want to build a custom Check Point Security Gateways. Software Blades can be purchased independently or as pre-defined bundles.

The following Security Management Software Blades are available:

Security Management Software Blades

Description

Network Policy Management

Gives you control over configuring and managing even the most complex security deployments. Based on the Check Point unified security architecture, the Network Policy Management Software Blade provides comprehensive security policy management using SmartDashboard - a single, unified console for all security features and functionality.

Endpoint Policy Management

Lets you centrally manage the security products you use on your organization's end-user devices. You control computing devices and the sensitive information they contain.

Logging & Status

Gives comprehensive information on security activity in logs and a complete visual picture of changes to gateways, tunnels, remote users, and security activities.

Identity Awareness

Lets you add user and computer identity data to Check Point log entries and configure which Active Directory domains to retrieve logs from.

Monitoring

Shows a complete picture of network and security performance, for fast response to changes in traffic patterns or security events

Management Portal

Extends browser-based management access to outside groups, such as technical support staff or auditors, and maintain centralized control of policy enforcement. Management Portal users can view security policies and status of Check Point products and administrator activity, edit, create and modify internal users, and manage firewall logs.

Workflow

Advanced management tool that lets you track and control changes to the network security configuration.

User Directory

Lets Check Point Security Gateways use LDAP-based user information stores, eliminating the risks associated with manually maintaining and synchronizing redundant data stores.

With the Check Point User Directory Software Blade, Check Point Security Gateways become full LDAP clients which communicate with LDAP servers to obtain identification and security information about network users.

Provisioning

Gives centralized provisioning of Check Point security devices. Using profiles, you can easily deploy a security policy or configuration settings to multiple, geographically distributed devices. It also gives centralized backup management and a repository of device configurations, to quickly deploy configurations to new devices.

SmartReporter

Centralizes reporting on network, security, and user activity and consolidates the data into concise predefined and custom-built reports. Easy report generation and automatic distribution save time and money.

SmartEvent

Gives centralized, real-time security event correlation and management for Check Point security gateways and third-party devices. This minimizes the time spent analyzing data, and isolates and prioritizes the real security threats.

SmartEvent Intro

Gives a complete event management system for situational visibility, easy to use forensic tools, and reporting for IPS, DLP, Application Control and URL Filtering, Anti-Bot and Anti-Virus.

Compliance

The Check Point Compliance Blade helps you optimize your security settings and meet regulatory requirements.

To verify which and how many Software Blades are currently installed on the Security Management Server, look at the SmartDashboard representation of the Security management server. In the General Properties page of the Security management server, the Management tab of the Software Blades section shows all enabled management Software Blades.

In a High Availability environment the Software Blade must be enabled on each High Availability Management.

Logging In

The login process, in which administrators connect to the Security Management server, is common to all SmartConsole applications (SmartDashboard, SmartUpdate, and so on). This process is bidirectional. The administrator and the Security Management server authenticate each other and create a secure channel of communication between them using Secure Internal Communication (SIC). When SIC is established, the Security Management server launches the selected SmartConsole.

Authenticating the Administrator

Administrators can authenticate themselves in different ways, depending on the tool used to create the accounts.

Administrators defined in Check Point Configuration Tool authenticate themselves with a Username and Password. This is asymmetric SIC. Only the Security Management server uses a certificate to authenticate.

Important - Administrators cannot use multi-challenge SecurID authentication for the SmartConsole clients, including SmartDashboard. To work around this limitation, configure your RSA server to work in the single transaction mode.

Administrators defined in SmartDashboard can authenticate with a username and password, or with a Certificate. If using a certificate, the administrator browses to the certificate and unlocks it with its password. This is symmetric SIC. The Security Management server and the administrator authenticate each other using certificates.

After giving authentication data, the administrator enters the name or IP address of the target Security Management server and clicks OK. If the administrator is successfully authenticated by the Security Management server:

Authenticating the Security Management Server Using its Fingerprint

The administrator authenticates the Security Management server using the Security Management server's Fingerprint. This Fingerprint, shown in the Fingerprint tab of the Check Point Configuration Tool, is obtained by the administrator before attempting to connect to the Security Management server.

The first time the administrator connects to the Security Management server, the Security Management server displays a Fingerprint verification window. The administrator, who has the original Fingerprint on hand, compares it to the displayed Fingerprint. If the two are identical, the administrator approves the Fingerprint as valid. This action saves the Fingerprint (along with the Security Management server's IP address) to the SmartConsole machine's registry, where it remains available to automatically authenticate the Security Management server in the future.

If the Fingerprints are not identical, the administrator quits the Fingerprint verification window and returns to the initial login window. In this case, the administrator should verify the resolvable name or IP address of the Security Management server.

SmartDashboard Access Modes

Many administrators can use SmartDashboard to connect to a Security Management server simultaneously. But only one administrator can have Read/Write access to change object definitions, security rules or Security Management server settings at one time. All other administrators connected at the same time have Read Only access.

If you connect to a Security Management server while another administrator is connected in the Read/Write mode, a message is shown with these options:

Important - Be careful when disconnecting another administrator. Unsaved changes made by the disconnected administrator are lost. Also, it is possible that some policies changed by the disconnected administrator were not installed on Security Gateways.

You can change the access mode after you open SmartDashboard.

To change the access mode:

  1. Open the File menu.
  2. Select Switch to Read Only or Switch to Read/Write.

Using SmartDashboard

SmartDashboard is your primary tool to manage network and security resources.

The SmartDashboard User Interface

The SmartDashboard shows a tab for the Software Blades you have in your Check Point deployment.

Each tab opens a different workspace and has different default panes and options in the menus.

SmartDashboard Toolbar

You can use the SmartDashboard toolbar to do these actions:

Icon

Description

Open the SmartDashboard menu. When instructed to select menu options, click this button to show the menu.

For example, if you are instructed to select Manage > Users and Administrators, click this button to open the Manage menu and then select the Users and Administrators option.

Save current policy and all system objects.

Open a policy package, which is a collection of Policies saved together with the same name.

Refresh policy from the Security Management.

Open the Database Revision Control window.

Change global properties.

Verify Rule Base consistency.

Install the policy on Security Gateways or VSX Gateways.

Open SmartConsole.

Objects Tree

You create objects to represent actual hosts and devices, intangible components (such as HTTP and TELNET services) and resources (for example, URI and FTP). Make an object for each component in your organization. Then you can use the objects in the rules of the Security Policy. Objects are stored in the Objects database on the Security Management server.

Objects in SmartDashboard are divided into several categories, which you can see in the tabs of the Objects Tree.

Icon

Object Type

Examples

Network Objects

Check Point Gateways, networks

Services

TCP, Ctirix

Resources

URI, FTP

Servers and OPSEC Applications

Trusted CAs

Users and Administrators

Access Roles, User Groups

VPN Communities

Site to Site, Remote Access

When you create your objects, consider the needs of your organization:

Creating Objects in the Objects Tree

One of the first things to do to protect your environment, is to define the objects in SmartDashboard. You can create objects in the Objects Tree, different panes, menus, or toolbars.

To add a new object:

  1. In the Objects Tree, select the type of object you want from the Objects Tree list.
  2. Right-click the appropriate category.
  3. Select the option that best describes the object to add.

    For example, to make an object that represents a network: in the Network Objects tab, right-click Networks and select New Network.

To see or change the properties of an object, right-click and select Edit, or double-click the object.

To delete an object, right-click and select Delete.

Typical Object Configuration

There are different ways to create objects and configure them to use in actual management tasks. This is an example of how to create and configure a Check Point Security Gateway object, starting in your Objects Tree.

To define a new Security Gateway object:

  1. Open the Objects Tree > Network Objects.
  2. Right-click Check Point and select Security Gateway/Management.
  3. In the window that opens, click Classic Mode.

    The Check Point gateway properties window shows the default pages.

  4. In General Properties, enter the hostname and the IP address of the gateway.

    If you can establish SIC trust now, it will make the rest of the process easier, but you can do this later.

  5. Select the platform that describes the Security Gateway: hardware, Check Point version, and operating system.

    If you are unsure of the platform data, you can leave this until after trust is established. If you do, you will see a message when you click OK:
    The specified OS on this Security Gateway is 'Unknown'.
    Click Yes to accept the configurations you have now and to fill in the rest later.

  6. Select the Software Blades that are installed on the Security Gateway.

    If you are unsure of the installed Software Blades, you can leave them unselected now and edit the object later. If you do not choose a Software Blade, you will see a message when you click OK. Click Yes to accept the configurations you have now and to fill in the rest later.

  7. Click OK.

    The Check Point network object is in the Objects Tree, but without Trust, it is just a holder.

Establishing Trust for Objects

The Security Management server manages Check Point components of your environment through SIC (Secure Internal Communication). There must be authentication between the components and the servers, which establishes Trust. See Secure Internal Communication (SIC).

When a network object has Trust with the server, you can manage the object through the SmartDashboard.

To establish trust:

  1. Open the network object properties (double-click the object in the Objects Tree).
  2. Click Communication.
  3. In the window that opens, enter and confirm the Activation Key used when the gateway was installed.
  4. Click Initialize.

    With Trust established, you can manage the actual component from its network object.

Completing Basic Configuration

When there is Trust between a Security Gateway and the Security Management server, it easier to configure the network object of the Security Gateway.

To configure a trusted Security Gateway:

  1. Double-click the gateway object in the Objects Tree > Network Objects.
  2. In the Platform area, click Get.
  3. In the Software Blades area, select those that are installed on the gateway.

    Some Software Blades have first time setup wizards. You can do these wizards now or later.

    The left pane of the properties window shows the properties that are related to the selected Software Blades. Continue with the default properties.

  4. In Topology, enter the interfaces that lead to and from the Security Gateway.

    If you selected the Firewall Software Blade, you can click Get to have the Security Management server get them for you.

  5. In NAT, you can activate NAT and configure the basics of Hide NAT or Static NAT.
  6. Click OK.

Network Topology

The network topology represents the internal network (both the LAN and the DMZ) protected by the gateway. The gateway must be aware of the layout of the network topology to:

Each component in the network topology is distinguished on the network by its IP address and net mask. The combination of objects and their respective IP information make up the topology. For example:

In this example, there is one simple internal network. In more complicated scenarios, the LAN is composed of many networks.

SC_Overview_ComplexTopology

The internal network is composed of:

In this example, the system administrator defines the topology of the Security Gateway accordingly.

In SmartDashboard:

Customizing Objects Tree Views

In each category of objects, you can change the view.

For Network Objects the default view is by category of network object. This is recommended for small to medium deployments and for when you are getting started. When you have groups of objects, you can see the objects in their groups. This is recommended for larger deployments, but is relevant only after you have groups of objects.

To create a group: In classic view, select Network Objects from the Objects Tree list. Right-click Groups > Groups and select a group type.

To change the Network Objects view: From the SmartDashboard menu, select View > Arrange Network Tree > Arrange by groups or Switch to classic view.

In all object trees, you can view by default categories or sort by property. To sort a tree: Right-click the root, select Sort and then select Name, Type, or Color.

Group Conventions

When you create a group, you can set conventions. When an object is created that fits the group conventions, you get a prompt to add the object automatically to the group.

group properties show conventions

To define group conventions:

  1. Open a group.
  2. Click Suggest to add objects to this group.
  3. Select conditions and define them.
    • If you define more than one condition, the conditions are met only if the object meets all of them.
    • If an object matches the conventions of multiple groups, a window shows the matching groups. You can add the object to all, none, or a selection of the groups.
    • Use the Add and Remove buttons to place objects in the Group.

If you change the properties of an object so it does not match the conditions of its group, you see this message:

Your object no longer fits the group name.
Do you wish to remove it from the group?

If you can remove an object from a group, the object itself is not changed or removed from the system. If you remove an object from its last group, you can find it in the Others group.

Rule Base

The Rule Base is the policy definitions of what is allowed and what is blocked by the firewall. Rules use objects. For example, networks objects are used in the Source and Destination of rules. Time and Group objects are used in the Time of rules.

Objects List

The Objects List shows data for a selected object category. For example, when a Logical Server Network Object is selected in the Objects Tree, the Objects List displays a list of Logical Servers, with certain details displayed.

Identity Awareness

The Identity Awareness pane shows as a tab in the bottom pane of the main window.

Traditionally, firewalls use IP addresses to monitor traffic and are unaware of the user and computer identities behind those IP addresses. Identity Awareness removes this notion of anonymity since it maps users and computer identities. This lets you enforce access and audit data based on identity.

Identity Awareness is an easy to deploy and scalable solution. It is applicable for both Active Directory and non-Active Directory based networks as well as for employees and guest users. It is currently available on the Firewall blade and Application Control blade and will operate with other blades in the future.

Identity Awareness lets you easily configure network access and auditing based on network location and:

When Identity Awareness identifies a source or destination, it shows the IP address of the user or computer with a name. For example, this lets you create firewall rules with any of these properties. You can define a firewall rule for specific users when they send traffic from specific computers or a firewall rule for a specific user regardless of which computer they send traffic from.

In SmartDashboard, you use Access Role objects to define users, computers and network locations as one object.

Identity Awareness gets identities from these acquisition sources:

SmartWorkflow

The SmartWorkflow pane shows as a tab in the bottom pane of the main window.

SmartWorkflow Blade is a security policy change management solution that tracks proposed changes to the Check Point network security environment, and ensures appropriate management review and approval prior to implementation.

Managing network operations while accurately and efficiently implementing security policies is a complex process. Security and system administrators find it increasingly difficult to ensure that all security gateways, network components and other system settings are properly configured and conform to organization security policies.

As enterprises evolve and incorporate technological innovations, network and security environments have become increasingly complex and difficult to manage. Typically, teams of engineers and administrators are required to manage configuration settings, such as:

An effective enterprise security policy change management solution is also essential to ensure compliance with increasingly stringent corporate governance standards and regulatory reporting requirements.

SmartMap

A graphical display of objects in the system is displayed in SmartMap view. This view is a visual representation of the network topology. Existing objects representing physical components such as gateways or Hosts are displayed in SmartMap, but logical objects such as dynamic objects cannot be displayed.

Secure Internal Communication (SIC)

Secure Internal Communication (SIC) lets Check Point platforms and products authenticate with each other. The SIC procedure creates a trusted status between gateways, management servers and other Check Point components. SIC is required to install polices on gateways and to send logs between gateways and management servers.

These security measures make sure of the safety of SIC:

The Internal Certificate Authority (ICA)

The ICA is created during the Security Management server installation process. The ICA is responsible for issuing certificates for authentication. For example, ICA issues certificates such as SIC certificates for authentication purposes to administrators and VPN certificates to users and gateways.

Initializing the Trust Establishment Process

Communication Initialization establishes a trust between the Security Management server and the Check Point gateways. This trust lets Check Point components communicate securely. Trust can only be established when the gateways and the server have SIC certificates.

Note - For SIC to succeed, the clocks of the gateways and servers must be synchronized.

The Internal Certificate Authority (ICA) is created when the Security Management server is installed. The ICA issues and delivers a certificate to the Security Management server.

To initialize SIC:

  1. In SmartDashboard, open the gateway network object. In the General Properties page of the gateway, click Communication to initialize the SIC procedure.
  2. In the Communication window of the object, enter the Activation Key that entered on the gateway during the gateway installation.

    This one-time activation password must exist on both sides.

  3. Click Initialize.

    The ICA signs and issues a certificate to the gateway. Trust state is Initialized but not trusted. The certificate is issued for the gateway, but not yet delivered.

    SSL negotiation takes place. The two communicating peers are authenticated with their Activation Key.

    The certificate is downloaded securely and stored on the gateway.

    After successful Initialization, the gateway can communicate with any Check Point node that possesses a SIC certificate, signed by the same ICA. The Activation Key is deleted. The SIC process no longer requires the Activation Key, only the SIC certificates.

Testing the SIC Status

The SIC status reflects the state of the Gateway after it has received the certificate issued by the ICA. This status conveys whether or not the Security Management server is able to communicate securely with the gateway. The most typical status is Communicating. Any other status indicates that the SIC communication is problematic. For example, if the SIC status is Unknown then there is no connection between the Gateway and the Security Management server. If the SIC status is Not Communicating, the Security Management server is able to contact the gateway, but SIC communication cannot be established. In this case an error message will appear, which may contain specific instructions how to remedy the situation.

Resetting the Trust State

Resetting the Trust State revokes the gateway's SIC certificate. This must be done if the security of the gateway has been breached, or if for any other reason the gateway functionality must be stopped. When the gateway is reset, the Certificate Revocation List (CRL) is updated to include the name of the revoked certificate. The CRL is signed by the ICA and issued to all the gateways in this system the next time a SIC connection is made. If there is a discrepancy between the CRL of two communicating components, the newest CRL is always used. The gateways refer to the latest CRL and deny a connection from an impostor posing as a gateway and using a SIC certificate that has already been revoked.

Important - The Reset operation must be performed on the gateway's object, using SmartDashboard, as well as physically on the gateway using the Check Point Configuration Tool.

To reset the Trust State in SmartDashboard:

  1. In SmartDashboard, in the General Properties window of the gateway, click Communication.
  2. In the Communication window, click Reset.
  3. To reset the Trust State in the Check Point Configuration tool of the gateway, click Reset in the Secure Internal Communication tab.
  4. Install the Security Policy on all gateways. This deploys the updated CRL to all gateways.

If SIC failed to initialize, and you do not have a Rule Base yet (and so cannot install a policy), you can reset Trust on the gateways.

To reset Trust on Check Point Security Gateways:

  1. Log in to the Check Point component.
  2. Enter: cpconfig
  3. Enter the number for Secure Internal Communication and press enter.
  4. Enter y to confirm that you are want to reset trust and are prepared to stop Check Point processes.
  5. Enter the activation key when prompted.
  6. When done, enter the number for Exit.
  7. Wait for the processes to stop and automatically start again.
  8. On SmartDashboard, establish trust again. Make sure to use the activation key that you entered on the component.

Troubleshooting SIC

If SIC fails to Initialize:

  1. Ensure connectivity between the Security Gateway and Security Management server.
  2. Verify that Security Management server and Security Gateway use the same SIC activation key.
  3. If the Security Management server is behind another Security Gateway, make sure there are rules that allow connections between the Security Management server and the remote Security Gateway, including Anti-spoofing settings.
  4. Ensure the IP address of the Security Management server and name are in the /etc/hosts file on the Security Gateway.

    If the IP address of the Security Management server undergoes static NAT by its local Security Gateway, add the public IP address of the Security Management server to the /etc/hosts file on the remote Security Gateway, to resolve to its hostname.

  5. Check the date and time of the operating systems and make sure the time is accurate. If the Security Management server and remote Security Gateway reside in two different time zones, the remote Security Gateway may need to wait for the certificate to become valid.
  6. On the command line of the Security Gateway, type: fw unloadlocal

    This removes the security policy so that all traffic is allowed through.

  7. Try again to establish SIC.

If Remote Access users cannot reach resources and Mobile Access is enabled: