Print Download PDF Send Feedback

Previous

Next

Managing Gateways

In This Section:

Creating a New Security Gateway

Manually Updating the Gateway Topology

Dynamically Updating the Topology

Secure Internal Communication (SIC)

Managing Software Blade Licenses

Enabling Gateways to Access Servers at their NATed IP Addresses

Creating a New Security Gateway

A Security Gateway enforces security policies configured on the Security Management Server.

To install security policies on the Security Gateways, configure the gateway objects in SmartConsole.

To define a new Security Gateway object:

  1. From the navigation toolbar, select Gateways & Servers.
  2. Click New, and select Gateway.

    The Check Point Security Gateway Creation window opens.

  3. Click Classic Mode.

    The Check Point Gateway properties window opens and shows the General Properties screen.

  4. Enter the host Name and the IPv4 Address or IPv6 Address.
  5. Click Communication.

    The Trusted Communication window opens.

  6. Select a Platform.
  7. In the Authentication section, enter and confirm the One-time password.

    If you selected Small Office Appliance platform, make sure Initiate trusted communication automatically when the Gateway connects to the Security Management Server for the first time is selected.

  8. Click Initialize to establish trusted communication with the gateway.

    If trust fails to establish, click OK to continue configuring the gateway.

  9. Click OK.
  10. The Get Topology Results window that opens, shows interfaces successfully configured on the gateway.
  11. Click Close.
  12. In the Platform section, select the Hardware, the Version, and the OS.

    If trust is established between the server and the gateway, click Get to automatically retrieve the information from the gateway.

  13. Select the Software Blades to enable on the Security Gateway.

    For some of the Software Blades a first-time setup wizard will open. You can run the wizard now or later. For more on the setup wizards, see the relevant Administration Guide.

Manually Updating the Gateway Topology

As the network changes, you must update the gateway topology.

To update the gateway topology:

  1. In SmartConsole, click Gateways & Servers.
  2. Double-click the gateway object.

    The gateway property window opens.

  3. Click Network Management.
  4. Click Get Interfaces.

    A warning window asks if you want to overwrite the existing Topology and Anti-spoofing settings.

  5. Click Yes.
  6. The Get Topology Results window opens.
  7. Click Accept.
  8. Click OK.

Dynamically Updating the Topology

This feature is supported only for Security Gateways R77.20 and above. Once selected, the range of IP addresses behind the internal interface is automatically calculated every second (default value) without the need for the administrator to click Get Interfaces and install a policy.

To configure dynamic topology updates:

  1. Open Gateway Properties > Network Management.
  2. Select an interface and click Edit.
  3. In the Topology section, click Modify.
  4. In the Leads To section, select Network defined by routes.
  5. Click OK.

This default update value is configured in SmartConsole > Preferences and set to one second. The value set here applies to all internal interfaces for all gateways in the domain.

To set the update value for a specific interface:

  1. Open Gateway Properties > Network Management.
  2. Select an interface and click Actions > Settings.
  3. Select Use custom update time (seconds) and set the desired update time.
  4. Click OK.

Dynamic Anti-Spoofing

When Anti-Spoofing is selected and you click Get interfaces, the Security Gateway generates a list of valid IP addresses based on the IP address and netmask of the interface and the routes assigned to the interface.

Anti-Spoofing drops packets with a source IP address that does not belong to the network behind the packet’s interface. For example, packets with an internal IP address that comes from an external interface.

When the Network defined by routes option is selected along with Perform Anti-Spoofing based on interface topology, you get Dynamic Anti-Spoofing. The valid IP addresses range is automatically calculated without the administrator having to do click Get Interfaces or install a policy.

Secure Internal Communication (SIC)

Check Point platforms and products authenticate each other through one of these Secure Internal Communication (SIC) methods:

SIC creates trusted connections between gateways, management servers and other Check Point components. Trust is required to install polices on gateways and to send logs between gateways and management servers.

Note - From R80.20 Jumbo Hotfix Accumulator Take 202, to see SIC errors, check the $CPDIR/log/sic_info.elg file on the Security Management Server and on the Security Gateway.

Initializing Trust

To establish the initial trust, a gateway and a Security Management Server use a one-time password. After the initial trust is established, further communication is based on security certificates.

Note - Make sure the clocks of the gateway and Security Management Server are synchronized, before you initialize trust between them. This is necessary for SIC to succeed. To set the time settings of the gateway and Security Management Server, go to the Gaia Portal > System Management > Time.

To initialize Trust:

  1. In SmartConsole, open the gateway network object.
  2. In the General Properties page of the gateway, click Communication.
  3. In the Communication window, enter the Activation Key that you created during installation of the gateway.
  4. Click Initialize.

    The ICA signs and issues a certificate to the gateway.

    Trust state is Initialized but not trusted. The Internal Certificate Authority (ICA) issues a certificate for the gateway, but does not yet deliver it.

    The two communicating peers authenticate over SSL with the shared Activation Key. The certificate is downloaded securely and stored on the gateway. The Activation Key is deleted.

    The gateway can communicate with Check Point hosts that have a security certificate signed by the same ICA.

SIC Status

After the gateway receives the certificate issued by the ICA, the SIC status shows if the Security Management Server can communicate securely with this gateway:

Trust State

If the Trust State is compromised (keys were leaked, certificates were lost) or objects changed (user leaves, open server upgraded to appliance), reset the Trust State. When you reset Trust, the SIC certificate is revoked.

The Certificate Revocation List (CRL) is updated for the serial number of the revoked certificate. The ICA signs the updated CRL and issues it to all gateways during the next SIC connection. If two gateways have different CRLs, they cannot authenticate.

  1. In SmartConsole, open the General Properties window of the gateway.
  2. Click Communication.
  3. In the Trusted Communication window that opens, click Reset.
  4. Install Policy on the gateways.

    This deploys the updated CRL to all gateways. If you do not have a Rule Base (and therefore cannot install a policy), you can reset Trust on the gateways.

    Important - Before a new trust can be established in SmartConsole, make sure the same one-time activation password is configured on the gateway.

Troubleshooting SIC

If SIC fails to Initialize:

  1. Make sure there is connectivity between the gateway and Security Management Server.
  2. Make sure that the Security Management Server and the gateway use the same SIC activation key (one-time password).
  3. If the Security Management Server is behind a gateway, make sure there are rules that allow connections between the Security Management Server and the remote gateway. Make sure Anti-spoofing settings are correct.
  4. Make sure the name and the IP address of the Security Management Server are in the /etc/hosts file on the gateway.

    If the IP address of the Security Management Server mapped through static NAT by its local gateway, add the public IP address of the Security Management Server to the /etc/hosts file on the remote gateway. Make sure the IP address resolves to the server's hostname.

  5. Make sure the date and the time settings of the operating systems are correct. If the Security Management Server and remote the gateway reside in different time zones, the remote gateway may have to wait for the certificate to become valid.
  6. Remove the security policy on the gateway to let all the traffic through: In the command line interface of the gateway, type: fw unloadlocal
  7. Try to establish SIC again.

Remote User access to resources and Mobile Access

If you install a certificate on a gateway that has the Mobile Access Software Blade already enabled, you must install the policy again. Otherwise, remote users will not be able to reach network resources.

To establish a new trust state for a gateway:

  1. Open the command line interface on the gateway.
  2. Enter: cpconfig
  3. Enter the number for Secure Internal Communication and press Enter.
  4. Enter y to confirm.
  5. Enter and confirm the activation key.
  6. When done, enter the number for Exit.
  7. Wait for Check Point processes to stop and automatically restart.

In SmartConsole:

  1. In the General Properties window of the gateway, click Communication.
  2. In the Trusted Communication window, enter the one-time password (activation key) that you entered on the gateway.
  3. Click Initialize.
  4. Wait for the Certificate State field to show Trust established.
  5. Click OK.

Understanding the Check Point Internal Certificate Authority (ICA)

The ICA (Internal Certificate Authority) is created on the Security Management Server when you configure it for the first time. The ICA issues certificates for authentication:

ICA Clients

In most cases, certificates are handled as part of the object configuration. To control the ICA and certificates in a more granular manner, you can use one of these ICA clients:

See audit logs of the ICA in SmartConsole Logs & Monitor > New Tab > Open Audit Logs View.

SIC Certificate Management

Manage SIC certificates in the

Certificates have these configurable attributes:

Attributes

Default

Comments

validity

5 years

 

key size

2048 bits

 

KeyUsage

5

Digital Signature and Key encipherment

ExtendedKeyUsage

0 (no KeyUsage)

VPN certificates only

To learn more about key size values, see RSA key lengths.

Managing Software Blade Licenses

After an administrator runs the First Time Configuration Wizard on a Security Management Server, and the Security Management Server connects to the Internet, it automatically activates its license and synchronizes with the Check Point User Center. If the Security Management Server loses Internet connectivity before the license is activated, it tries again, on an interval.

If the administrator makes changes to Management Software Blade licenses of a Security Management Server in the Check Point User Center, these changes are automatically synchronized with that Security Management Server.

Notes:

To make sure that your environment is synchronized with the User Center, even when the Security Management Server is not connected to the Internet, we recommend that you configure a Check Point server with Internet connectivity as a proxy.

In SmartConsole, you can see this information for most Software Blade licenses:

See the R80.20 Release Notes for a list of supported Software Blades

Configuring a Proxy gateway

To configure a proxy on a Check Point server:

  1. On the Security Management Server, add these lines to $CPDIR/tmp/.CPprofile.sh:
    • _cpprof_add HTTP_CLIENT_PROXY_SICNAME "<proxy server sic name>" 0 0
    • _cpprof_add HTTP_CLIENT_PROXY_IP "<proxy server IP>" 0 0
  2. Reboot the Security Management Server.

Viewing Licenses in SmartConsole

To view license information:

Step

Description

1

In SmartConsole, from the left navigation panel, click Gateways & Servers.

2

From the Columns drop-down list, select Licenses.

You can see these columns:

Column

Description

License Status

The general state of the Software Blade licenses:

  • OK - All the blade licenses are valid.
  • Not Activated - Blade licenses are not installed. This is only possible in the first 15 days after the establishment of the SIC with the Security Management Server. After the initial 15 days, the absence of licenses will result in the blade error message.
  • Error with <number> blade(s) - The specified number of blade licenses are not installed or not valid.
  • Warning with <number> blade(s) - The specified number of blade licenses have warnings.
  • N/A - No available information.

CK

Unique Certificate Key of the license instance.

SKU

Catalog ID from the Check Point User Center.

Account ID

User's account ID.

Support Level

Check Point level of support.

Support Expiration

Date when the Check Point support contract expires.

To view license information for each Software Blade:

Step

Description

1

Select a Security Gateway or a Security Management Server.

2

In the Summary tab below, click the object's License Status (for example: OK).

The Device & License Information window opens. It shows basic object information and License Status, license Expiration Date, and important quota information (in the Additional Info column) for each Software Blade.

Notes:

  • Quota information, quota-dependent license statuses, and blade information messages are only supported for R80.
  • The tooltip of the SKU is the product name.

The possible values for the Software Blade License Status are:

Status

Description

Active

The Software Blade is active and the license is valid.

Available

The Software Blade is not active, but the license is valid.

No License

The Software Blade is active but the license is not valid.

Expired

The Software Blade is active, but the license expired.

About to Expire

The Software Blade is active, but the license will expire in thirty days (default) or less (7 days or less for an evaluation license).

Quota Exceeded

The Software Blade is active, and the license is valid, but the quota of related objects (gateways, files, virtual systems, and so on, depending on the blade) is exceeded.

Quota Warning

The Software Blade is active, and the license is valid, but the number of objects of this blade is 90% (default) or more of the licensed quota.

N/A

The license information is not available.