Introduction to VPN
Migrating from Traditional Mode to Simplified Mode
To migrate from Traditional Mode VPN to Simplified Mode:
- On the > page, select one of these options:
- Click .
- From the R80 SmartConsole , select .
The window opens.
- Click .
The window opens.
- Give a name to the new policy and select .
In the Security Policy Rule Base, a new column marked shows and the Encrypt option is no longer available in the Action column. You are now working in Simplified Mode.
Configuring a Meshed Community Between Internally Managed Gateways
To configure an internally managed VPN meshed community:
- Install and configure the Security Gateways.
- In R80 SmartConsole, double click on the Security Gateway object.
- In the page:
- Enter the gateway .
- Enter the or (or both).
- In the tab, Select .
- Click and establish trusted communication with the Gateway.
- In the page, click .
- After the interfaces show in the table, click to open the window.
- In the window, define the general properties of the interface and the topology of the network behind it.
- In the > page, define the VPN domain one of:
The network Security Gateway objects are now configured, and need to be added to a VPN community.
Note - There is nothing to configure on the page, regarding certificates, because internally managed Security Gateways automatically receive a certificate from the internal CA.
- Open the (Ctrl+E), and select .
- Click > > .
The window opens.
- In the page, select if you need all traffic between the Security Gateways to be encrypted. If not, then create appropriate rules in the Security Policy Rule Base that allows encrypted traffic between community members (step 7).
- On the page, add the Security Gateways created in step 1.
A VPN tunnel is now configured.
You can also configure these options: , , and
- If you did not select in the page of the Community, build an access control policy, for example:
Source
|
Destination
|
VPN
|
Services & Applications
|
Action
|
Any
|
Any
|
Meshed community
|
Any
|
Accept
|
Where "Meshed community" is the VPN community you have just defined.
Configuring a Star VPN Community
A star VPN community is configured in much the same way as a meshed community, the difference being the options on the window:
- On the page - Select .
- On the Gateways page:
- - Add the central Security Gateways.
- - Select if you want the central Security Gateways to communicate.
- - Add the satellite Security Gateways.
Confirming a VPN Tunnel Successfully Opens
To make sure that a VPN tunnel has successfully opened:
- Edit the VPN rule and Select as the option.
- Open and click a new tab.
- From the bottom of the window, click
Check Point SmartView Monitor opens.
- Click the gateway to see IPsec VPN traffic and tunnels opened. A successful connection shows encrypt, decrypt and key install logs.
Alternatively, search for VPN in R80 SmartConsole to see the relevant logs:
- Open SmartView Monitor and see that VPN tunnels are up.
VPN with External Security Gateways Using Certificates
To configure VPN using certificates, with the external Security Gateways as satellites in a star VPN Community:
- Obtain the certificate of the CA that issued the certificate for the peer VPN Security Gateways, from the peer administrator. If the peer Security Gateway is using the ICA, you can obtain the CA certificate using a web browser from:
http://<IP address of peer Security Gateway or Management Server>:18264
- In R80 SmartConsole, define the CA object for the CA that issued the certificate for the peer.
- Define the CA that will issue certificates for your side if the Certificate issued by ICA is not appropriate for the required VPN tunnel.
You may have to export the CA certificate and supply it to the peer administrator.
- Define the Network Object(s) of the Security Gateway(s) that are internally managed. In particular, be sure to do the following:
- In the page of the Security Gateway object, select .
- In the page, define the .
- In the page, define the VPN Domain. If it does not contain all the IP addresses behind the Security Gateway, define the VPN domain manually by defining a group or network of machines and setting them as the VPN Domain.
- If the ICA certificate is not appropriate for this VPN tunnel, then in the page, generate a certificate from the relevant CA.
- Define the Network Object(s) of the externally managed Security Gateway(s).
- If it is not a Check Point Security Gateway, define an Interoperable Device: In Object Explorer click .
- If it is a Check Point Security Gateway, define an Externally Managed VPN Gateway: In Object Explorer, click .
- Set the various attributes of the peer Security Gateway. In particular, be sure to do the following:
- For an Externally Managed Check Point Security Gateway: In the page of the Security Gateway object, select .
- Define the .
- Define the using the VPN Domain information obtained from the peer administrator. If the VPN Domain does not contain all the IP addresses behind the Security Gateway, define the VPN domain manually by defining a group or network of machines and setting them as the VPN Domain.
- For an Externally Managed Check Point Security Gateway: In the page, define the . Specify that the peer must present a certificate signed by its own CA. If feasible, enforce details that appear in the certificate as well.
- Define the Community.
These details assume that a Star Community is used, but you can also use a Meshed Community. If you are working with a Meshed community, ignore the difference between the Central Security Gateways and the Satellite Security Gateways.
- Agree with the peer administrator about the various IKE properties and set them in the page and the page of the community object.
- Define the Central Security Gateways. These are usually the internally managed ones. If no other Community is defined for them, decide whether or not to mesh the central Security Gateways. If they are already in a Community, do not mesh the central Security Gateways.
- Define the Satellite Security Gateways. These are usually the external ones.
- Click and publish the changes.
- Define the relevant access rules in the Security Policy.
- Add the Community in the column, the services in the column, the desired , and the appropriate option.
- Install the Access Control Policy.
VPN with External Security Gateways Using Pre-Shared Secret
The configuration instructions require an understanding of how to build a VPN.
To configure a VPN using pre-shared secrets, with the external Security Gateways as satellites in a star VPN Community:
- Define the Network Object(s) of the Security Gateways that are internally managed. In particular, be sure to:
- In the page of the Security Gateway object, in the Network Security tab, select .
- In the page, define the .
- In the > page, define the VPN Domain. If it does not contain all the IP addresses behind the Security Gateway, define the VPN domain manually by defining a group or network of machines and setting them as the VPN Domain.
- Define the Network Object(s) of the externally managed Security Gateway(s).
- If it is not a Check Point Security Gateway, define an Interoperable Device: In Object Explorer click .
- If it is a Check Point Security Gateway, define an Externally Managed VPN Gateway: In Object Explorer, click .
- Set the various attributes of the peer Security Gateway. In particular, make sure to configure:
- In the page, define the Topology and the VPN Domain using the VPN Domain information obtained from the peer administrator.
- If the VPN Domain does not contain all the IP addresses behind the Security Gateway, define the VPN domain manually by defining a group or network of machines and setting them as the VPN Domain.
- Define the Community.
The following details assume that a Star Community was chosen, but a Meshed Community is an option as well. If you are working with a Mesh community, ignore the difference between the Central Security Gateways and the Satellite Security Gateways.
- Agree with the peer administrator about the various IKE properties and set them in the page and the page of the community object.
- Define the Central Security Gateways. These will usually be the internally managed ones. If there is no another Community defined for them, decide whether or not to mesh the central Security Gateways. If they are already in a Community, do not mesh the central Security Gateways.
- Define the Satellite Security Gateways. These will usually be the external ones.
- Publish the changes.
- Agree on a pre-shared secret with the administrator of the external Community members. Then, in the page of the community, select . For each external peer, enter the pre-shared secret.
- Define the relevant access rules in the Access Control Policy. Add the Community in the column, the services in the column, the desired , and the appropriate option.
- Install the Security Policy.
Authorizing Firewall Control Connections in VPN Communities
Check Point Nodes communicate with other Check Point Nodes by means of control connections. For example, a control connection is used when the Security Policy is installed from the Security Management Server to a Security Gateway. Also, logs are sent from Security Gateways to the Security Management Server across control connections. Control connections use Secure Internal Communication (SIC).
Control connections are allowed using Implied Rules in the Access Control Rule Base. Implied Rules are added to or removed from the Access Control Rule Base, by selecting or clearing options in the page of the R80 SmartConsole .