In This Section: |
The Global Domain is a collection of rules, objects and settings shared with all Domains or with specific Domains. The system automatically creates the Global Domain when you install Multi-Domain Management. You cannot delete the Global Domain.
You organize global rules, objects and settings into global configurations. Each global configuration can include one or more of these components:
To connect to the Global Domain:
A SmartConsole instance opens for the Global Domain.
This section includes basic procedures for working the contents of the Global Domain.
When connected to the Global Domain you can:
These activities are not supported in this release:
Use global objects in global configuration rules. Global objects work much in the same way as objects in local Policy rules.
The Global Domain includes many, predefined global objects for your convenience. These default global objects are visible (read only), in the Global Domain. You cannot delete or change them.
You can create, change or delete user-defined global objects in the Global Domain only. Global objects are visible in local Domains in the read-only mode.
Important - Before you delete a global object, make sure that no global or local policy rules use this global object. This can cause errors when you reassign global configurations.
To add a new global object:
You can also create a new global object with the Object Explorer.
To change a user-defined global object, select it in the Object Explorer, and then change the applicable settings.
To delete a user-defined object, select it in the Object Explorer and click Delete.
Important - After you complete the global object task, assign or reassign the global configuration to the applicable Domains. This action automatically:
This section is a general overview of the procedure for defining rules in global Policies. To learn more about Policy rules and their configuration procedures, see the R80.10 Security Management Administration Guide .
Global Policy Layers have one placeholder for local Domain rules. You can create global rules above and below this placeholder. In the local Domain Policy Layer, you define local rules in the placeholder. If there are no local Domain rules, the placeholder can be empty.
The position of rules in Domain Policy Layers defines the order in which they are enforced. It is important to put rules in the correct sequence. Global Policy Layers do not have implied rules, but implied rules can be inherited from global properties in local Domains.
Best Practice - Define a global cleanup rule in each Policy Layer.
There is no NAT Rule Base in the Global Domain and you cannot define NAT settings there. You must define NAT rules manually in Domain Policy Layers.
Workflow for global Domain Policy Layers:
A SmartConsole instance opens for the Global Domain.
The system creates a task, during which these actions occur:
Global Access Control rules use a placeholder for local Domain rules. The position of this placeholder in the Rule Base controls the order that Security Gateways handle global and local Policy rules. For simplicity of presentation, this example shows one Global Policy Layer that has both Network and Application rules. In the real world, there are different Policy Layers for these two rule types.
Sample Global Policy Layer
No. |
Name |
Source |
Destination |
VPN |
Services & |
Action |
---|---|---|---|---|---|---|
1 |
Management to |
Gateway objects |
Management |
Any |
Any |
Accept |
2 |
FB & Twitter |
Internal Net |
Any |
Any |
Facebook |
Drop |
3 |
Placeholder for Domain Rules |
Domain Layer |
||||
4 |
DMZ Notify |
Internal Net |
DMZ Net |
Any |
Any |
Inform |
5 |
Cleanup |
Any |
Any |
Any |
Any |
Drop |
In this example, the placeholder for local Domain rules is rule number 3. Global Domain rules 1 and 2 run before the local Domain rules. Global rule 4 and the cleanup rule run after the local Domain rules.
Each local Domain Policy includes both Global Domain Policy rules and local Domain rules that apply to its Security Gateways. Local Domain Policy rules show in a Domain Layer under a parent rule.
Sample Domain Policy Layer with Global and Local Domain Rules
No. |
Name |
Source |
Destination |
VPN |
Services & |
Action |
---|---|---|---|---|---|---|
1 |
Management to |
Gateway objects |
Management |
Any |
Any |
Accept |
2 |
FB & Twitter |
Internal Net |
Any |
Any |
Facebook |
Drop |
3 |
Parent Rule for Local Domain Policy |
|
||||
3.1 |
External to SD server |
External Net |
Host_10.10.10.11 |
Any |
Any |
Accept |
3.2 |
Finance |
Finance |
Finance Dept |
Any |
Any |
Accept |
3.3 |
File Sharing Allowed |
Any |
Any |
Any |
Dropbox |
Accept |
4 |
DMZ Notify |
Internal Net |
DMZ Net |
Any |
Any |
Inform |
5 |
Cleanup |
Any |
Any |
Any |
Any |
Drop |
In this example, the Security Gateways handle the global configuration rules (1 and 2) and then the local Domain rules. If there is still no match in the local rules, the Security Gateways handle the last two global rules, including the cleanup rule.
Although a local Domain can define implied rules, it is a best practice to put critical global rules at the beginning of the Rule Base. Put the global cleanup rule at the end. This overrides the implicit cleanup rule and gives you flexibility to define an effective sequence for local Domain rules.
Global Threat Prevention rules use a placeholder for local Domain rules. The position of this placeholder in the Rule Base controls the order that Security Gateways handle global and local Policy rules. The first rule that matches traffic generates the specified action.
Sample global Policy Rule Base
No. |
Name |
Protected Scope |
Protection |
Action |
Track |
Install On |
---|---|---|---|---|---|---|
1 |
Max Security |
Portal Server |
N/A |
Strict |
Alert |
Policy Targets |
Global Exceptions (No Rules) |
||||||
E-1.1 |
MS Office False Positives |
Any |
MS Word |
Detect |
Log |
Policy Targets |
2 |
Printers & Other Devices |
Peripheral Net |
N/A |
Basic |
Log |
Policy Targets |
Global Exceptions (No Rules) |
||||||
3 |
Parent Rule for Domain Policy |
Domain Layer |
||||
4 |
Cleanup |
Any |
N/A |
Optimized |
Log |
Policy Targets |
Global Exceptions (No Rules) |
In this example, the local Domain placeholder is rule number 3. Global Domain rules 1 and 2 run before the local Domain rules. Global Domain rule 4 is the default rule that runs after the local Domain rules.
Each Domain Policy includes both global rules and local rules that apply to its Security Gateways. Local Domain Policy rules show in a local Domain Layer under a parent rule.
Sample Domain Rule Base with global and local Domain Rules
No. |
Name |
Protected Scope |
Protection |
Action |
Track |
Install On |
---|---|---|---|---|---|---|
1 |
Max Security |
Portal Server |
N/A |
Strict |
Alert |
Policy Targets |
Global Exceptions (No Rules) |
||||||
E-1.1 |
MS Office False Positives |
Any |
MS Word |
Detect |
Facebook |
Policy Targets |
2 |
Printers & Other Devices |
Peripheral Net |
N/A |
Basic |
Log |
Policy Targets |
Global Exceptions (No Rules) |
||||||
3 |
Placeholder for Domain Policy |
Domain Layer |
||||
3.1 |
Management Threats |
Management |
N/A |
Optimized |
Log |
Policy Targets |
3.2 |
Guests |
Guest |
N/A |
Strict |
Log |
Policy Targets |
4 |
Cleanup |
Any |
N/A |
Optimized |
Log |
Policy Targets |
This example shows Policy Layer with Global Domain rules together with the local Domain rules.
Note - You cannot disable local Policy Layers in the Global Domain. This option is not available.
When you upgrade an R77.x or earlier Multi-Domain Server, existing Policies are converted in this manner:
The use of Policy Layers lets you define granular permissions for different aspects of security management. In a typical organization, only administrators with Global Management or Superuser privileges can work with Global Policy Layers. Domain Managers or Domain Level Only administrators typically have permissions to work with specified Policy Layers in their local Domains.
Dynamic objects are "logical" network objects for which IP addresses or address ranges are not explicitly defined. You define dynamic objects in the Global Domain and use them in global configuration rules. The dynamic objects are resolved to local objects when you assign the global policy to the local Domains.
You can create dynamic objects for most object types, including Security Gateways, hosts, services, networks and groups. Use the standard global objects available in SmartConsole or create your own global objects. All dynamic objects must have the _global
suffix, which identifies the objects as global.
There are two types of dynamic objects:
The use of dynamic objects makes it possible to create global rules with no specified network objects. This lets you create rules that are templates.
To create a new global dynamic object:
Or
For the Dynamic Global Network Object, the name must have the suffix _global
. For example, FTP_Server_global
.
To use a dynamic global network object in a local Domain rule:
_global
suffix.The local object must include the applicable local parameters, such as the IP address.
When you assign the global policy to the local Domain, the local object replaces this Dynamic Global Network Object.
For Dynamic Objects, there is no need to create an equivalent local object.
You can create Security Rules in Global Domain that are installed on some Security Gateways or groups of Security Gateways and not others. This way, Security Gateways with different functions on one Domain can receive different security rules for a specified function or environment. When you install global policy to a number of similarly configured Domains, the related global rules are installed to all of the related Security Gateways on each Domain.
This feature is particularly useful for enterprise deployments of Multi-Domain Management, where Domains typically represent geographic subdivisions of an enterprise. For example, an enterprise deployment may have Domains for business units in New York, Boston, and London, and each Domain is similarly configured, with a Security Gateway (or Security Gateways) to protect a DMZ, and others to protect the perimeter. This capability lets you configure the global policy so that some global security rules are installed to DMZ Security Gateways, and different rules are installed to the perimeter Security Gateways.
Note - Global security rules can be installed on Security Gateways, Edge Security Gateways, and Open Security Extension (OSE) devices. |
To install a specified security rule on a specified Security Gateway or types of Security Gateways:
_global
to the end of the name._global
.Best Practice - While you can give a Security Gateway a name of the global dynamic object, we recommend to create a group to preserve future scalability (for instance, to include another Security Gateway with this function). We do not recommend changing the name of an existing Security Gateway to the dynamic object name.
A global assignment is a Multi-Domain Management system object that assigns a global configuration to one specified Domain. You create global assignments to assign different combinations of Global Access Control Policies, Global Threat Prevention Policies, and global object definitions to different Domains.
When you create a new global assignment, it automatically assigns the specified global configuration to the specified Domain. It also publishes the assignment and updates local Domain Policies.
Best Practice - When you create a new Domain, create a global assignment for that Domain at the same time.
When you do one or more of these actions, you must publish the Global Domain session and reassign the global configuration:
The assign/reassign action does not automatically install Policies.
Best Practice - Install Policies after you assign or reassign a global assignment.
To create a new global assignment:
You can click Advanced to open the Advanced Assignment window to assign the selected Policy:
You can click Advanced to open the Advanced Assignment window to assign the selected Policy:
This option lets you change IPS protection actions for Security Gateways on the local Domain.
The system creates a task, which:
To change an existing global assignment:
The system creates a task which:
Important: You can create a global assignment that does not include a Global Access Control and Threat Prevention Policy. To do this, select the None value to both Policy types. The global configuration assigns only the defined global objects and settings to Domains.
When you make changes to the global configuration items, the assignment status changes to Not up to date. The assignment status does not change if you make changes to the local Domain Policies.
To reassign global configurations:
The system creates a task which:
Global assignments run as a task that you can monitor while you work on other tasks.
To monitor assignment/reassignment tasks:
The Recent Tasks window opens.
If your task does not show, click Show More.
The Assignment Task Details window shows the task progress and details.
Some common errors include:
When you delete a global assignment, the global configuration rules and objects no longer apply to its Domain.
Best Practice - Immediately create a new global assignment so that Domain Security Gateways continue to enforce global configuration rules.
Important - You must remove global objects from all local Domain rules before you can delete a global assignment. If there is a rule that uses a global object when you try to delete a global assignment, the delete operation fails. |
To delete a global assignment:
You can see the global assignment status in the Assignment Up to Date column, in the Multi-Domain > Global Assignments view. For each Domain, the date of the last assignment shows together with a status icon:
Assignment is up to date - no action necessary. |
|
The global configuration is not assigned or the assignment is not up to date. Assign or update the global configuration as soon as possible. |
Check Point continuously develops and improves its protections against emerging threats. You can manually update the database with latest IPS protections. You must also configure the Global Domain to automatically download contracts and other important data.
Note - Security Gateways with IPS enabled only get the updates after you install Policy.
For troubleshooting or for performance tuning, you can revert to an earlier IPS protection package.
To manually update the IPS protections:
To revert to an earlier protection package:
To make sure that Contract Downloads is enabled:
This parameter is enabled by default. If it is not enabled, select it.
Check Point constantly develops and improves its protections against the latest threats. You can manually update the Application & URL Filtering database with the latest applications and URLs.
To manually update the Application & URL Filtering protections: