Advanced Identity Awareness Environment
Configure a Check Point Security Gateway Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. with enabled Identity Awareness Check Point Software Blade on a Security Gateway that enforces network access and audits data based on network location, the identity of the user, and the identity of the computer. Acronym: IDA. Software Blade Specific security solution (module): (1) On a Security Gateway, each Software Blade inspects specific characteristics of the traffic (2) On a Management Server, each Software Blade enables different management capabilities. for better security for your network environment and corporate data. This section describes recommended deployments with Identity Awareness.
|
Important:
|
Advanced Options
You can deploy an Identity Awareness Gateway in two different network options:
-
IP routing mode
-
Transparent mode (bridge mode)
IP routing mode - This is a regular and standard method used to deploy Identity Awareness Gateways. You usually use this mode when you deploy the Identity Awareness Gateway at the perimeter. In this case, the Identity Awareness Gateway behaves as an IP router that inspects and forwards traffic between the internal interface and the external interface in both directions. Both interfaces should be located and configured using different network subnets and ranges.
Transparent mode - Known also as a "bridge mode". This deployment method lets you install the Identity Awareness Gateway as a Layer 2 device, rather than an IP router. The benefit of this method is that it does not require any changes in the network infrastructure. It lets you deploy the Identity Awareness Gateway inline in the same subnet. This deployment option is mostly suitable when you must deploy an Identity Awareness Gateway for network segregation and Data Center protection purposes.
Deploying a Test Environment
|
Best Practice - If you want to evaluate how Identity Awareness operates in a Security Gateway, we recommend that you deploy it in a simple environment. The recommended test setup below gives you the ability to test all identity sources and create an identity-based Policy. |
The recommendation is to install 3 main components in the setup:
-
User host (Windows)
-
Check Point Security Gateway R75.20 or higher
-
Microsoft Windows server with Active Directory, DNS and IIS (Web resource)
Deploy the Security Gateway in front of the protected resource, the Windows server that runs IIS (web server). The user host computer will access the protected resource via the Security Gateway.
Testing Identity Agents
Enable and configure Identity Agents, and configure Identity Agents self-provisioning through Captive Portal (see Identity Awareness Clients Administration Guide).
-
Open a browser and connect to the web resource.
You are redirected to the Captive Portal.
-
Enter user credentials.
-
Install the client as requested by the Captive Portal.
When the client is installed wait for an authentication pop-up to enter the user credentials through the client.
-
Test connectivity.