In This Section: |
Dynamic Objects are logical objects whose values, IP addresses or ranges, are resolved differently per gateway. This enables you to create rules, Security Policies, and SmartProvisioning SmartLSM Security Profiles that are can be re-used for numerous gateways.
Dynamic Objects are defined in SmartConsole and referenced in Security Policies, NAT tables, and profiles. Some Dynamic Objects are provided by default.
Dynamic Objects let you:
There are different types of Dynamic Objects, differentiated by how they are resolved.
Auto Resolved Dynamic Objects
Default Dynamic Object |
Resolves to: |
---|---|
AuxiliaryNet |
IP address range, based on the IP address and net mask of the interface configured as the Auxiliary network for the SmartLSM Security Gateway |
DMZNet |
IP address range, based on the IP address and net mask of the interface configured as the DMZ network for the SmartLSM Security Gateway |
InternalNet |
IP address range, based on the IP address and net mask of the LAN behind the SmartLSM Security Gateway configured as the Internal network |
LocalMachine |
External IP address of the SmartLSM Security Gateway, based on the IP address of the interface marked External |
LocalMachine_All_Interfaces |
DAIP machine interfaces, both static and dynamic |
Dynamic Objects resolve to actual IP address or IP address ranges. They are automatically resolved when a gateway fetches a SmartLSM Security Policy from the Security Management Server or Domain Management Server.
You can also actively push the values of Dynamic Objects, and make sure that new values take effect immediately. To push Dynamic Object values, select Actions > Push Dynamic Objects.
When a SmartLSM Security Gateway fetches its SmartLSM Security Profile, automatically or by push, the SmartLSM Security Policy is localized for each gateway. Localization is performed in this order:
To use Dynamic Objects:
To create centrally and locally resolved Dynamic Objects:
If a fetched SmartLSM Security Policy includes Dynamic Objects for which you did not configure values, the firewall drops all packets that match any rules with these Unresolved Dynamic Objects. Therefore, you must define all Centrally Resolved Dynamic Objects, and verify that local administrators in remote and branch offices define the values for Locally Resolved Dynamic Objects.
After you create a Dynamic Object in SmartConsole, you can add it to a SmartLSM Security Gateway. Provide the exact IP address or range to which SmartProvisioning will resolve the Dynamic Object.
Note - The Dynamic Objects tab on the gateway has an Add button. With the Add button, you cannot create new Dynamic Objects. The Add button lets you add a new resolve-to value to an already defined Dynamic Object for the selected SmartLSM Security Gateway. If you click Add and already resolved all defined Dynamic Objects, this message shows: All defined Dynamic Objects are already resolved. Use the Check Point SmartConsole in order to add more Dynamic Objects
To specify the resolution value of a user-defined Dynamic Object:
The Comments field displays the comments provided by the Dynamic Object creator.
The Dynamic Object name is added to the Resolved Dynamic Objects table. If the value is a single IP address, this address is listed in the First IP column.
These examples show how to create a Security Policy in SmartConsole that uses Dynamic Objects. After you create the Rule Base, install the Security Policy on the SmartLSM Security Profile.
The Dynamic Objects are localized and resolved to the real IP addresses of each gateway assigned to the SmartLSM Security Profile. Therefore, for each gateway of a profile on which the Security Policy with the Dynamic Objects is installed, make sure that the gateway has these Dynamic Objects configured with real IP addresses and net masks.
Note - The value of the LocalMachine Dynamic Object is resolved to the external IP address of the SmartLSM Security Gateway.
This example uses the InternalNet and LocalMachine default Dynamic Objects to create a rule in a Security Policy that can be applied to any SmartLSM Security Profile object, and therefore, to any number of gateways. This rule hides the internal network behind the external IP address of the SmartLSM Security Gateway.
Example — NAT Hide
Source |
Destination |
Service |
Source |
Destination |
Service |
---|---|---|---|---|---|
InternalNet |
Any |
Any |
LocalMachine(H) |
Any |
Any |
This example uses Dynamic Objects that you can define for yourself, based on the needs of your organization and the requirements for the SmartLSM Security Gateways. This rule configures static NAT on all incoming HTTP traffic going to a published IP address (the IP address is represented by a Dynamic Object called PublishedIP), as if it were going to a Web server (represented by a Dynamic Object called WebServer).
Example — Static NAT
Source |
Destination |
Service |
---|---|---|
Any |
PublishedIP |
HTTP |
Any |
WebServer |
HTTP |
This example uses the InternalNet and DMZNet default Dynamic Objects to secure traffic between a gateway's internal LAN and its DMZ. This example shows that when you create rules with Dynamic Objects, you must make sure to install them on the relevant SmartLSM Security Profile, the profile for which all its gateways have these Dynamic Objects configured.
LAN Rules
Source |
Destination |
VPN |
Service |
Action |
Log |
Install On |
---|---|---|---|---|---|---|
InternalNet |
DMZNet |
*Any Traffic |
Any |
Accept |
None |
Profile1 |
This example shows a rule that allows external hosts to ping the external IP address of a SmartLSM Security Gateway. It is installed on multiple profiles, which lets this rule be a part of numerous gateways.
External Hosts Rules
Source |
Destination |
VPN |
Service |
Action |
Log |
Install On |
---|---|---|---|---|---|---|
Any |
LocalMachine |
*Any Traffic |
ICMP echo- request |
Accept |
None |
Profile1 LSMProfile1 |
This example uses a centrally resolved Dynamic Object to hold an IP address range that represents part of an internal LAN behind a SmartLSM Security Gateway. The complete range is 192.0.2.1 - 192.0.2.255. You want only 192.0.2.1 - 192.0.2.128 of this LAN to be in a VPN tunnel with the CO gateway.
In SmartConsole:
VPN with Range
Source |
Destination |
VPN |
Service |
Action |
Install On |
---|---|---|---|---|---|
Any |
LocalMachine |
MyComm |
ftp telnet |
Accept |
MyCO |
Safe_Internal |
CO_VPN |
MyComm |
ftp telnet |
Accept |
MyProfile |
CO_VPN |
Safe_Internal |
MyComm |
ftp telnet |
Accept |
MyProfile |
In SmartProvisioning: