In This Section: |
Secured communication between your CO gateway and the SmartLSM Security Gateways depends on correct configuration of the Virtual Private Network.
You can define how the VPN domain of a selected SmartLSM Security Gateway is encrypted. You can change the keys as needed and perform other VPN maintenance and change management operations. Before you can configure the IKE certificate, you must have already defined Certificate Authority servers as objects in SmartConsole. See the R80.30 Security Management Administration Guide.
Note - After you change the CO gateway configuration, it can be necessary to create a new certificate. This is especially important when there are topology changes.
To configure the VPN encryption of a selected SmartLSM Security Gateway:
If, when you created this SmartLSM Security Gateway in the gateway creation wizard, you cleared the I wish to create a VPN Certificate from the Internal CA option, you can select VPN Not supported. No IKE certificate is generated. You can change this setting at any time.
For this SmartLSM Security Gateway to participate in a VPN, continue with the next steps.
If you selected I wish to create a VPN Certificate from the Internal CA in the wizard, this option is automatically selected and cannot be edited.
If you cleared I wish to create a VPN Certificate from the Internal CA in the wizard, you can select a third-party CA from this list.
If you selected I wish to create a VPN Certificate from the Internal CA in the wizard, the Check Point Internal CA is selected and cannot be edited.
To generate a new IKE certificate, click Reset.
The SmartLSM Security Gateway's Distinguished Name (DN) of the certificate is automatically provided and cannot be edited.
This section explains how to create the VPN itself in SmartConsole. Before doing so, you must first configure, in SmartProvisioning, the SmartLSM Security Gateways to support VPN participation.
To create a VPN tunnel between a SmartLSM Security Gateway and a CO gateway:
When you select the profile, all SmartLSM Security Gateways assigned to this SmartLSM Security Profile are added to the VPN community. The gateways must be configured with the ability to participate in a VPN community (see Configuring VPNs on SmartLSM Security Gateways).
A topology file and a certificate are downloaded to the SmartLSM Security Gateway, listing the members of the VPN community and specifying encryption information.
After you create the VPN tunnel in SmartConsole, do these steps:
To creating a VPN community for SmartLSM Security Gateways, you must create a step for creating a rule in SmartConsole's Security Policy Rule Base that defines the services for the VPN community.
In the rules, these Dynamic Objects are used:
Rule for Outgoing Connections
Source |
Destination |
VPN |
Service |
Action |
Install On |
---|---|---|---|---|---|
Any |
Any |
MyCommunity |
ftp telnet |
Accept |
MyCO |
VPN Rules for Incoming Connections
Source |
Destination |
VPN |
Service |
Action |
Install On |
---|---|---|---|---|---|
Edge_Net |
CO_VPN |
MyCommunity |
ftp telnet |
Accept |
MyProfile |
CO_VPN |
Edge_Net |
MyCommunity |
ftp telnet |
Accept |
MyProfile |
You can configure a VPN star community between two SmartLSM Profiles. The procedures below show a SmartLSM Gateway Profile and SmartLSM Cluster Profile. You can also configure the community with two SmartLSM Cluster Profiles or two SmartLSM Gateway Profiles. All included SmartLSM Gateways and Cluster Profiles must have the IPsec VPN blade enabled.
The procedure requires configuration in:
In SmartConsole, create network objects that represent the VPN community members and their networks. You must create a star community with To center and to other satellites through center as the selected option for VPN Routing in the Star Community Properties.
To configure a VPN star community between two SmartLSM Profiles in SmartConsole:
When you configure the topology, make sure that the interface name exactly matches the name of the physical interface.
Note - Small Office Appliance cannot be the Center Gateway.
A New Star Community window opens.
Edit the routing table of the Domain Management Server or Security Management Server to enable two SmartLSM Gateways or Cluster Profiles to communicate with each other through the Center Gateway. Do this in the
file in the CLI.vpn_route.conf
To edit the vpn_route.conf file:
Open the
file.vpn_route.conf
/var/opt/CPmds-R80.30/customers/<Domain Management Server_name>/CPSG80CMP-R80.30/conf/vpn_route.conf
/opt/CPmds-R80.30/customers/<Domain Management Server_name>/CPsuite-R80.30/fw1/conf/vpn_route.conf
/opt/CPSG80CMP-R80.30/conf/vpn_route.conf
/opt/CPsuite-R80.30/fw1/conf/vpn_route.conf
If two SmartLSM Gateways on different LSM Gateway profiles communicate with each other through the Center gateway, edit the file:
# destination |
router |
[install on] |
<Network Group Name of internal network of SmartLSM Gateway> |
<Center Gateway> |
<Name of second LSM Profile> |
<Network Group Name of internal network of second SmartLSM Gateway> |
<Center Gateway> |
<Name of LSM Profile> |
If more than one SmartLSM Gateway in the same LSM Profile communicate with each other through the Center gateway, edit the file:
# destination |
router |
[install on] |
<Network Group Name of internal network of SmartLSM Gateway> |
<Center Gateway> |
<Name of LSM Profile> |
Install policy on the SmartLSM Profiles and on the Center Gateway.
Complete the configuration in the SmartProvisioning Console and the CLI of the Center Gateway.
To complete the VPN configuration:
Note - If the topology information, including date and time, changes after you generate the certificate, you must generate a new certificate in the VPN tab and update the gateway (Actions > Update Gateway).
LSMenabler on
All traffic between the satellites and Center Gateway is encrypted.
The VPN routing option To center and to other satellites through center is not supported by SmartLSM Security Gateways.
To configure VPN routing to SmartLSM Security Gateways through the center, enable VPN Routing for a hub and spoke configuration, by editing the
file on the Security Management Server.vpn_route.conf
For example:
vpn_route.conf
, add the rule:Destination |
Router |
Install On |
---|---|---|
SmartLSM_domain |
Center_gws |
SmartLSM_profile |
You can have a Star VPN topology for multiple routing gateways, if the gateways are listed under install on in the vpn_route.conf
For more information, see Route Based VPN in the R80.30 Site to Site VPN Administration Guide.