Remote Access Solutions for Different Deployments
Configuring Desktop Security - Server Side
To enable the gateway to be a Policy Server for Desktop Security:
- Click and double-click the Security Gateway.
The gateway window opens and shows the page.
- On the tab section select and .
- Click and publish the changes.
To activate the Desktop Security policy:
- Click and open the window (CTRL + T).
- Click the icon.
- Select the policy that you want to edit and click .
The policy window opens.
- Select .
- Click and publish the changes.
To configure the Desktop Policy rules:
- Click and from the navigation tree click .
- Click .
SmartDashboard opens and shows the tab.
- Configure the inbound rules. Using the Rules>Add Rule menu item, you can add rules to the policy.
In inbound rules, the SecureClient (the desktop) is the destination, and you can specify the users to which the rule is to be applied.
- Configure the outbound rules.
In outbound rules, the SecureClient (the desktop) is the source, and you can specify the users to which the rule is to be applied.
- Click and close SmartDashboard.
- Publish the changes and install the policy.
Make sure that you install the Advanced Security policy on the Security Gateways and the Desktop Security policy on your Policy Servers.
Configuring Office Mode and L2TP Support
To configure L2TP support:
- Configure Office Mode.
- Click and double-click the Security Gateway.
The gateway window opens and shows the page.
- From the navigation tree, click VPN Clients > Remote Access.
- Click Support L2TP.
- Select the Authentication Method for the users:
- To use certificates, choose Smart Card or other Certificates (encryption enabled).
- To use a username and a shared secret (password), choose MD5-challenge.
- For Use this certificate, select the certificate that the Security Gateway presents in order to authenticate itself to users.
- Click and publish the changes.
Configuring the CA to Issue Certificates (L2TP)
To configure the CA with the ICA Management Tool:
- Run the ICA Management tool:
- Change the property IKE Certificate Extended Key Usage property to the value 1, to issue Security Gateway certificates with the "server authentication" purpose.
- Change the property IKE Certificate Extended Key Usage to the value 2 to issue user certificates with the "client authentication" purpose.
If you are using an OPSEC certified CA to issue certificates, use the DBedit command line or GuiDBedit, the graphical Database Tool to change the value of the global property cert_req_ext_key_usage to 1. This causes the Security Management Server to request a certificate that has purposes (Extended Key Usage extension) in the certificate.
To configure the CA with R80 SmartConsole:
- Click and double-click the Security Gateway.
The gateway window opens and shows the page.
- From the navigation tree, click .
- In the Repository of Certificates Available to the Gateway section, click .
- The Certificate Properties window opens.
- Configure the settings for the certificate and click .
- Select the certificate and click .
- Make sure that the Extended Key Usage Extension appears in the certificate.
- From the navigation tree, click .
- In the L2TP Support section, select the new certificate.
- Click and publish the changes.
Configuring SCV - Server Side
To configure SCV settings in Global Properties:
- From Menu, click .
- From the navigation tree, click .
- Configure the settings:
- Apply Secure Configurations on Simplified Mode - Specifies if SCV is applied to all remote access rules in the simplified policy mode.
- Upon Verification failure - Specifies the action that is performed when the client fails one or more SCV checks. The options are to the client's connection or to it and send a log about the event.
- Basic configuration verification on client's machine - Specifies whether SecureClient performs SCV checks to determine if the policy is installed on all network interfaces cards on the client's desktop, and if only TCP/IP protocols are installed on these interfaces.
- Configurations Violation Notification on client's machine - Specifies if a log record is saved on the Security Management Server machine indicating that a remote user is not verified by SCV (this is a general indication, without a specification of a certain SCV check the user's desktop had failed).
- Click and publish the changes.
Configuring Client to Client Routing
R80 SmartConsole includes a default object for Office Mode IP addresses, . You can use the default object, or create a new one for your network.
To create a new Office Mode IP address object:
- In R80 SmartConsole, click (Ctrl+E).
- Click .
- Enter the , and .
- Click and publish the changes.
To configure VPN routing for remote access clients with the VPN domain:
- Create a network group, click .
- Add these settings:
- VPN domain
- Office Mode range
- Encryption domain settings
- Click and publish the changes.
- Click and double-click the Security Gateway.
The gateway window opens and shows the page.
- From the navigation tree, click .
- Click Manually defined.
- Select the new network group.
- Click and publish the changes.
The remote clients must connect to the site and perform a site update before they can communicate with each other.
Multiple External Interfaces
To use multiple external interfaces with Remote Access clients:
- Open R80 SmartConsole.
- Click and double-click the Security Gateway.
The gateway window opens and shows the page.
- From the navigation tree, click .
- In the section, select.
- Click .
- Install policy on the gateway.
Configuring Directional VPN with Remote Access Communities
To configure Directional VPN with Remote Access communities:
- From Menu, click .
- From the navigation tree, click .
- Click .
- Click and publish the changes.
- Go to
- Right-click the VPN cell for the rule, and select .
The window opens.
- Configure the directional VPN:
- From , select the source of the connection
- From , select the connection's destination
- Click and publish the changes.
- Install the policy.
Authentication Timeout Interval
For Connect Mode, the countdown to the timeout begins from the time that the Client is connected.
To specify the length of time between re-authentications:
- From Menu, click .
- From the navigation tree, click .
- In the Authentication Timeout section, configure the setting:
-
- In , enter the number of minutes between re-authentications
- Click and publish the changes.
Configuring the SecuRemote DNS Server
Names in the domain that correspond to the rule that the SecuRemote DNS Server resolves. All other names are resolved by the SecuRemote client's default DNS server.
To configure the object for the SecuRemote DNS Server:
- In R80 SmartConsole, click (Ctrl+E).
- Click .
The SecuRemote DNS Properties window opens.
- In the tab, configure these settings:
- of the SecuRemote DNS Server
- Select the object for this server
- In the tab, click .
- In , enter the value that the SecuRemote DNS Server resolves to the internal names. For example,
checkpoint.com
- Configure the settings for the .
- Select Match only *.suffix to specify that the maximum number of labels resolved is 1.
For example, if Domain Suffix is checkpoint.com
and Match only *.suffix is selected, then the SecuRemote DNS Server resolves and . It does not resolve
- Select Match up to...labels preceding the suffix to increase the number of labels to be matched.
For example, if Domain Suffix is checkpoint.com
and Match up to...labels preceding the suffix is selected and set to , then the SecuRemote DNS Server used to resolves and . It does not resolve
- Click and close the window.
- Publish the changes.
Proxy Replacement for the Security Gateway
To configure the Security Gateway to support Visitor Mode:
- From Menu, click .
- From the navigation tree, click .
- In the page, click .
The Advanced Configuration window opens:
- From the navigation tree, click .
- Select one of these options:
- ie_proxy_replacement - When selected, Windows proxy replacement is always performed, even if Visitor Mode is not enabled
- ie_proxy_replacement_limit_to_tcpt - When selected, the proxy replacement is only when Visitor Mode is enabled