A Security Gateway enforces security policies configured on the Security Management Server.
A Security Gateway enforces security policies configured on the Security Management Server.
To install security policies on the Security Gateways, configure the gateway objects in SmartConsole.
To define a new Security Gateway object:
The Check Point Security Gateway Creation window opens.
The Check Point Gateway properties window opens and shows the General Properties screen.
The Trusted Communication window opens.
If you selected Small Office Appliance platform, make sure Initiate trusted communication automatically when the Gateway connects to the Security Management Server for the first time is selected.
If trust fails to establish, click OK to continue configuring the gateway.
If trust is established between the server and the gateway, click Get to automatically retrieve the information from the gateway.
For some of the Software Blades a first-time setup wizard will open. You can run the wizard now or later. For more on the setup wizards, see the relevant Administration Guide.
As the network changes, you must update the gateway topology.
To update the gateway topology:
The gateway property window opens.
Check Point platforms and products authenticate each other through one of these Secure Internal Communication (SIC) methods:
Gateways above R71 use AES128 for SIC. If one of the gateways is below R71, the gateways use 3DES. The strongest common cypher is used.
SIC creates trusted connections between gateways, management servers and other Check Point components. Trust is required to install polices on gateways and to send logs between gateways and management servers.
To establish the initial trust, a gateway and a Security Management Server use a one-time password. After the initial trust is established, further communication is based on security certificates.
Note - Make sure the clocks of the gateway and Security Management Server are synchronized, before you initialize trust between them. This is necessary for SIC to succeed. To set the time settings of the gateway and Security Management Server, go to the Gaia Portal > System Management > Time.
To initialize Trust:
The ICA signs and issues a certificate to the gateway.
Trust state is Initialized but not trusted. The Internal Certificate Authority (ICA) issues a certificate for the gateway, but does not yet deliver it.
The two communicating peers authenticate over SSL with the shared Activation Key. The certificate is downloaded securely and stored on the gateway. The Activation Key is deleted.
The gateway can communicate with Check Point hosts that have a security certificate signed by the same ICA.
After the gateway receives the certificate issued by the ICA, the SIC status shows if the Security Management Server can communicate securely with this gateway:
If the Trust State is compromised (keys were leaked, certificates were lost) or objects changed (user leaves, open server upgraded to appliance), reset the Trust State. When you reset Trust, the SIC certificate is revoked.
The Certificate Revocation List (CRL) is updated for the serial number of the revoked certificate. The ICA signs the updated CRL and issues it to all gateways during the next SIC connection. If two gateways have different CRLs, they cannot authenticate.
This deploys the updated CRL to all gateways. If you do not have a Rule Base (and therefore cannot install a policy), you can reset Trust on the gateways.
Important - Before a new trust can be established in SmartConsole, make sure the same one-time activation password is configured on the gateway.
To establish a new trust state for a gateway:
In SmartConsole:
If SIC fails to Initialize:
/etc/hosts
file on the gateway.If the IP address of the Security Management Server mapped through static NAT by its local gateway, add the public IP address of the Security Management Server to the /etc/hosts
file on the remote gateway. Make sure the IP address resolves to the server's hostname.
fw unloadlocal
Remote User access to resources and Mobile Access
If you install a certificate on a gateway that has the Mobile Access Software Blade already enabled, you must install the policy again. Otherwise, remote users will not be able to reach network resources.
The ICA (Internal Certificate Authority) is created on the Security Management Server when you configure it for the first time. The ICA issues certificates for authentication:
In most cases, certificates are handled as part of the object configuration. To control the ICA and certificates in a more granular manner, you can use one of these ICA clients:
cpconfig
CLI utility. One of the options creates the ICA, which issues a SIC certificate for the Security Management Server.See audit logs of the ICA in SmartConsole Logs & Monitor > New Tab > Open Audit Logs View.
Manage SIC certificates in the
Certificates have these configurable attributes:
Attributes |
Default |
Comments |
---|---|---|
validity |
5 years |
|
key size |
2048 bits |
|
KeyUsage |
5 |
Digital Signature and Key encipherment |
ExtendedKeyUsage |
0 (no KeyUsage) |
VPN certificates only |
To learn more about key size values, see RSA key lengths.