In This Section: |
The Security Management Server must have these IAM permissions:
ec2:DescribeNetworkInterfaces
ec2:DescribeSubnets
ec2:DescribeInstances
elasticloadbalancing:DescribeLoadBalancers
elasticloadbalancing:DescribeTags
elasticloadbalancing:DescribeListeners
elasticloadbalancing:DescribeTargetGroups
elasticloadbalancing:DescribeRules
elasticloadbalancing:DescribeTargetHealth
autoscaling:DescribeAutoScalingGroups
ec2:DescribeCustomerGateways
ec2:CreateCustomerGateway
ec2:DeleteCustomerGateway
ec2:DescribeRouteTables
ec2:EnableVgwRoutePropagation
ec2:DisableVgwRoutePropagation
ec2:DescribeVpnGateways
ec2:CreateVpnGateway
ec2:AttachVpnGateway
ec2:DetachVpnGateway
ec2:DeleteVpnGateway
ec2:DescribeVpnConnections
ec2:CreateVpnConnection
ec2:DeleteVpnConnection
cloudformation:DescribeStacks
cloudformation:DescribeStackResources
cloudformation:CreateStack (resource: arn:aws:cloudformation:*:*:stack/vpn-by-tag--*/*)
cloudformation:DeleteStack (resource: arn:aws:cloudformation:*:*:stack/vpn-by-tag--*/*)
If you have a Check Point Security Management Server on AWS already (version 317 or higher), or on-premises Check Point Security Management Server R80.10 with R80.10 Jumbo Hotfix Take 135 (or higher), you can use it to manage the Transit VPC Security Gateways.
Location of the |
Instructions |
---|---|
Security Management Server in AWS |
To deploy a new Security Management Server in AWS, see sk130372 > Section Installing the Check Point Security Management Server. Note - Make sure to select Create with read-write permissions in the IAM role dropdown field. This is required to include these permissions in the IAM policy of the IAM role attached to the Security Management Server. |
Security Management Server on-premises |
To deploy a new Security Management Server on-premises, or use an existing Security Management Server on-premises, see sk130372 > Section Deploying a Security Management Server on-premises. |
In This Section: |
Follow the instructions below to configure the Transit service, which controls CloudGuard's integration to AWS Endpoints that seamlessly operate the AWS Transit Hub solution.
Examples of other configuration are in the Examples of autoprov-cfg Configurations section.
This tool configures the Check Point Security Management Server with all the settings needed for Transit:
Step |
Description |
---|---|
1 |
Connect to the command line on the Check Point Security Management Server. |
2 |
Log in to the Expert mode. |
3 |
Run all the commands below. Commands and their description: |
|
|
|
|
|
|
|
|
4 |
Run this command to test the configuration:
Make sure there are no errors. If the test ends with any error, see the Troubleshooting section. |
Learn how to use the autoprov_cfg
CLI tool to configure different deployment scenarios.
In the examples below, replace the bolded variables, with values in your environment.
Scanning the Transit and spoke account is authenticated using the management IAM role only.
Step |
Syntax |
---|---|
1 |
|
2 |
|
3 |
|
Add a sub-account to the Controller with an STS role on the spoke account for spoke scanning.
The Management IAM role scans the transit account.
Step |
Syntax |
---|---|
1 |
|
2 |
|
3 |
|
Trust between the management and transit accounts is done with STS roles.
Add a sub-account to the Controller with an STS role on the spoke account to allow spoke scanning.
Add an STS role for the transit account on the Controller to scan gateways.
Step |
Syntax |
---|---|
1 |
|
2 |
|
3 |
|
Management, Transit, and spoke VPCs are each on their own account. A user with programmatic access is set on the transit account.
Add a sub-account to the Controller with an STS role on the spoke account for spoke scanning.
Add an access key and a secret key of a user with programmatic access on the transit account on the Controller, to scan gateways.
Step |
Syntax |
---|---|
1 |
|
2 |
|
3 |
|
This script creates a VPN Community with all the settings needed for Transit:
Step |
Description |
---|---|
1 |
Connect to the command line on the Check Point Security Management Server. |
2 |
Log in to the Expert mode. |
3 |
Run:
Example:
|
Step |
Description |
---|---|
1 |
Connect with SmartConsole to your Check Point Security Management Server. |
2 |
If the Security Management Server and the Security Gateway have to communicate through public IP addresses, make sure that the Security Management Server object is defined with the elastic IP address. Edit the Security Management Server object and change the IP address. Important - If you change the main IP address of the Security Management Server, you must issue and install the license(s) for the new IP address. |
3 |
Create the Security Policy you want to install on the Transit Gateways. When you name the policy package, use the package name you set when you executed the |
4 |
We recommend you create an explicit VPN Directional rule in the Access Control Policy to allow the required services to work over the VPN tunnels: |
4A |
Enable the support for VPN directional rules:
|
4B |
Create an explicit VPN Directional rule:
|
5 |
Install the Access Control Policy on the Transit gateways. |
Step |
Description |
---|---|
1 |
Connect to the command line on the Check Point Multi-Domain Server. |
2 |
Log in to the Expert mode. |
3 |
Execute the |
4 |
Execute the
Replace the "<DOMAIN_NAME |
5 |
Tag a spoke VPC on a Multi-Domain Server. On a Multi-Domain Server, you have to indicate the specific Domain, on which Transit has to manage the VPN connection to the spoke VPC. Therefore, the tag value structure for the spoke VPC also must have the Domain name. Tag key: Tag value: Where:
|