In This Section: |
An Access Control Policy Rule Base consists of these types of rules:
In R80 the Access Control policy unifies the policies of these pre-R80 Software Blades:
You can create Access Control policy rules that are based on:
The information on connections is collected in one log file from all the Software Blades.
These are the fields of the rules in the Access Control policy. Not all of these are shown by default. To select a field that does not show, right-click on the Rule Base table header, and select it.
Field |
Description |
---|---|
No. |
Rule number in the Rule Base Layer. |
Hits |
Number of connections that match this rule. |
Name |
Name that the system administrator gives this rule. |
Source |
Network object that defines where the traffic starts. |
Destination |
Network object that defines the destination of the traffic. |
Services & Applications |
Services, Applications, Categories, and Sites. |
Action |
Action that is done when traffic matches the rule. Options include: Accept, Drop, Ask, Inform (UserCheck message), and Reject. |
Track |
Tracking and logging action that is done when traffic matches the rule. |
Install On |
Network objects that will get the rule(s) of the policy. |
Time |
Time period that this rule is enforced. |
Comment |
An optional field that lets you summarize the rule. |
There are three types of rules in the Rule Base - explicit, implied and implicit.
Explicit rules
The rules that the administrator configures explicitly, to allow or to block traffic based on specified criteria.
Important - The Cleanup rule is a default explicit rule and is added with every new layer. You can change or delete the default Cleanup rule. We recommend that you have an explicit cleanup rule as the last rule in each layer. |
Implied rules
The default rules that are available as part of the Global properties configuration and cannot be edited. You can only select the implied rules and configure their position in the Rule Base:
Implied rules are configured to allow connections for different services that the Security Gateway uses. For example, the Accept Control Connections rules allow packets that control these services:
Implicit cleanup rule
The default "catch-all" rule that deals with traffic that does not match any explicit or implied rules in the Policy Layers. For R77.30 or earlier versions Security Gateways, the action of the implicit rule depends on the Policy Layer:
Note - If you change the default values, the policy installation will fail.
The implicit rules do not show in the Rule Base.
Some of the implied rules are enabled by default. You can change the default configuration as necessary.
To configure the implied rules:
The Global Properties window opens.
To better manage a policy with a large number of rules, you can use Sections to divide the Rule Base into smaller, logical components. The division is only visual and does not make it possible to delegate administration of different Sections to different administrators.
When you upgrade a pre-R80 Security Management Server that manages pre-R80 Security Gateways to R80, the existing Access Control policies are converted in this way:
Important – After upgrade, do not change the Action of the implicit cleanup rules, or the order of the Policy Layers. If you do, the policy installation will fail.
New Access Control Policy for pre-R80 Security Gateways on an R80 Security Management Server must have this structure:
If the Access Control Policy has a different structure, the policy will fail to install.
You can change the names of the Layers, for example, to make them more descriptive.
Each new Policy Layer will have the explicit default rule, added automatically and set to Drop all the traffic that does not match any rule in that Policy Layer. We recommend that the Action is set to Drop for the Network Policy Layer and Accept for the Application Control Policy Layer.
If you remove the default rule, the Implicit Cleanup Rule will be enforced. The Implicit Cleanup Rule is configured in the Policy configuration window and is not visible in the Rule Base table. Make sure the Implicit Cleanup Rule is configured to Drop the unmatched traffic for the Network Policy Layer and to Accept the unmatched traffic for the Application Control Policy Layer.
When a packet arrives at the gateway, the gateway checks it against the rules in the top Policy Layer, sequentially from top to bottom, and enforces the first rule that matches a packet.
If the Action of the matching rule is Drop, the gateway stops matching against later rules in the Policy Rule Base and drops the packet. If the Action is Accept, the gateway continues to check rules in the next Policy Layer down.
If none of the rules in the Policy Layer match the packet, the explicit Default Cleanup Rule is applied. If this rule is missing, the Implicit Cleanup Rule is applied.
Important - Always add an explicit Default Cleanup Rule at the end of each Policy Layer, and make sure that its Action is the same as the Action of the Implicit Cleanup Rule. |
Order in which the rules in each Access Control Policy Layer are applied:
Note - If you use the Cleanup rule as the last explicit rule, the Last Implied Rule and the Implicit Cleanup Rule are not enforced.
Best practices for performance-efficient Access Control Policy
A firewall controls access to computers, clients, servers, and applications through a set of rules that comprise an Access Control Rule Base. You need to configure a Rule Base that not only provides highly secure Access Control, but optimizes network performance. A strong Access Control Rule Base:
A robust security policy must have some basic rules in its Rule Base.
These are basic Access Control rules we recommend for all Rule Bases:
Note - There is also the implicit drop rule that drops all traffic that did not match all other rules. This rule does not create log entries. If you want to log the traffic, create an explicit cleanup rule. |
This shows a sample Firewall Rule Base for a typical security policy. (The Hits and VPN columns are not shown.)
No |
Name |
Source |
Destination |
Service |
Action |
Track |
Install On |
---|---|---|---|---|---|---|---|
1 |
Stealth |
NOT internal |
GW-group |
Any |
Drop |
Alert |
Policy Targets |
2 |
Critical subnet |
Internal |
Finance |
Any |
Accept |
Log |
CorpGW |
3 |
Tech support |
TechSupport |
Remote1-web |
HTTP |
Accept |
Alert |
Remote1GW |
4 |
DNS server |
Any |
DNS |
Domain UDP |
Accept |
None |
Policy Targets |
5 |
Mail and Web servers |
Any |
DMZ |
HTTP |
Accept |
Log |
Policy Targets |
6 |
SMTP |
NOT Internal |
SMTP |
Accept |
Log |
Policy Targets |
|
7 |
DMZ & Internet |
IntGroup |
Any |
Any |
Accept |
Log |
Policy Targets |
8 |
Clean up rule |
Any |
Any |
Any |
Drop |
Log |
Policy Targets |
IP spoofing replaces the untrusted source IP address with a fake, trusted one, to hijack connections to your network. Attackers use IP spoofing to send malware and bots to your protected network, to execute DoS attacks, or to gain unauthorized access.
Anti-Spoofing detects if a packet with an IP address that is behind a certain interface, arrives from a different interface. For example, if a packet from an external network has an internal IP address, Anti-Spoofing blocks that packet.
Example:
The diagram shows a Gateway with interfaces A and B, and C, and some example networks behind the interfaces.
For the Gateway, anti-spoofing makes sure that
If an incoming packet to B has a source IP address in network 192.168.33.0, the packet is blocked, because the source address is spoofed.
When you configure Anti-Spoofing on a Check Point Security Gateway, specify the type of networks that each interface faces - External (Internet) or Internal.
Make sure to configure Anti-Spoofing protection on all the interfaces of the Security Gateway, including internal interfaces.
To configure Anti-Spoofing for an interface:
The General Properties window of the gateway opens.
The gateway network topology shows. If SmartConsole fails to automatically retrieve the topology, make sure that the details in the General Properties section are correct and the Security Gateway, the Security Management Server, and the SmartConsole can communicate with each other.
The Interface properties window opens.
The Topology Settings window opens.
For each interface, repeat the configuration steps. When finished, install the policy.
In some configurations, the Firewall must allow connections with an internal IP address from an external source. For example, an external application can assign internal IP addresses to external clients. You can configure the Anti-Spoofing protection on the external interfaces to ignore connections from these IP addresses. The Firewall allows these connections and does not inspect them.
Today there are many challenges for businesses to keep up with security requirements of social media and Web 2.0 applications. It is necessary for system administrators to use the security policy to overcome these challenges. For example:
The Check Point URL Filtering and Application Control Software Blades can help organizations of all sizes monitor and control the use of Internet by their employees. You can easily create policies which identify or block thousands of applications and Internet sites.
Use the URL Filtering and Application Control Software Blades to:
UserCheck works with the URL Filtering and Application Control Software Blades and lets the Security Gateways send messages to users about possible non-compliant or dangerous Internet browsing. Create UserCheck objects and use them in the Application Control and URL Filtering rules, to communicate with the users. These actions use UserCheck objects:
UserCheck on a Security Gateway
You can enable UserCheck on Security Gateways that use URL Filtering and Application Control Software Blades. When UserCheck is enabled, the user's Internet browser shows the UserCheck messages in a new window.
UserCheck on a computer
The UserCheck client is installed on endpoint computers. This client:
To enable R80 Application Control and URL Filtering for pre-R80 gateways, enable the Application Control and URL Filtering Software Blades on each gateway. Then, if necessary, create a second Layer for the Application Control and URL Filtering rules. Configure this second Layer for the Access Control Policy.
To enable URL Filtering and Application Control Software Blades on a Security Gateway:
The General Properties window of the gateway opens.
To create a second Layer for URL Filtering and Application Control:
The Policy window opens and shows the General view.
The Layer Editor window opens and shows the General view.
We recommend the name Application.
Internet browsing is not easily defined into allowed and prohibited categories. Many websites and applications can be used for legitimate business reasons. The rules that control Internet access must be flexible and granular. The Access Control Policy Rule Base uses these fields to create a strong and flexible URL Filtering and Application Control security policy:
In the Services & Applications column, define the Web applications, sites, services and protocols that are included in the rule. A rule can contain one or more:
If an application is allowed in the policy, the rule is matched only on the recommended services of the application. This default setting is more secure than allowing the application on all services. For example: a rule that allows Facebook, allows it only on the Application Control Web browsing services: http
, https
, HTTP_proxy
, and HTTPS_proxy
.
If an application is blocked in the policy, it is blocked on all services. It is therefore blocked on all ports.
You can change the default match settings for applications.
You can configure how a rule matches an application or category that is allowed in the policy. You can configure the rule to match the application:
or
To do this, change the Match Settings of the application or category. The application or category is changed everywhere that it is used in the policy.
To change the matched services for an allowed application or category:
By default, if an application is blocked in the policy, it is blocked on all services. It is therefore blocked on all ports.
You can configure the matching for blocked applications so that they are matched on the recommended services. For Web applications, the recommended services are the Web browsing services.
If the match settings of the application are configured to Customize, the blocked application is matched on the customized services. It is not matched on all ports.
To configure matching for blocked applications:
Note - This setting applies to all applications, not only to Web applications.
Summary of Application Matching in a "Block" Rule
Application - Match Setting |
Checkbox: Match web application on 'Any' port when used in 'Block' rule |
Blocked Application is Matched on Service |
---|---|---|
Recommended services (default) |
Selected (default) |
Any |
Recommended services (default) |
Not selected |
Recommended services |
Customize |
Not relevant |
Customized |
Any |
Not relevant |
Any |
You can add services to a rule, or applications and sites.
To add services, applications or sites to a rule:
You can create custom applications, categories or groups, that are not included in the Check Point Application Database.
To create a new application or site:
The Application viewer window opens.
If you used a regular expression in the URL, click URLs are defined as Regular Expressions.
Note - If the application or site URL is defined as a regular expression you must use the correct syntax.
To create a custom category:
The Application viewer window opens.
In the Action field, define what occurs to traffic that matches the URL Filtering and Application Control rule. These are the Action options:
Action |
Description |
---|---|
Accept |
Allows the traffic. |
Drop |
Blocks the traffic. Optionally, shows a UserCheck Block message. |
Limit |
Limits the bandwidth that is permitted for a rule. Add a Limit object to configure a maximum throughput for uploads and downloads. |
Enable Identity Captive Portal |
Redirects HTTP traffic to an authentication (captive) portal. After the user is authenticated, new connections from this source are inspected without requiring authentication. |
These are the Action options that work with UserCheck:
Action |
Description |
---|---|
Drop |
Blocks the traffic. Optionally, shows a UserCheck Block message. |
Ask |
Shows a UserCheck Ask message. The message asks users to confirm that it is necessary that they go to the application or site. |
Inform |
Sends a message to the user attempting to access the application |
UserCheck Frequency |
Defines how often users see the UserCheck message for Ask, Inform, or Block actions. |
Confirm UserCheck |
Select the action that triggers a UserCheck message:
|
This shows some examples of URL Filtering and Application Control rules for a typical policy that monitors and controls Internet browsing. (The Hits and Install On columns are not shown.)
No. |
Name |
Source |
Destination |
Applications/ |
Action |
Track |
Time |
---|---|---|---|---|---|---|---|
1 |
Liability sites |
Any |
Internet |
Potential |
Blocked Message |
Log |
Any |
2 |
High risk applications |
Any |
Internet |
High Risk iTunes |
High Risk Block Message |
Log |
Any |
3 |
Allow IT department Remote Admin |
IT |
Any |
Radmin |
Allow |
Log |
Work- |
4 |
Allow Facebook for HR |
HR |
Internet |
Allow Download_1Gbps Down: 1 Gbps |
Log |
Any |
|
5 |
Block these categories |
Any |
Internet |
Streaming Media Social Networking P2P File Sharing Remote Administration |
Blocked Message |
Log |
Any |
6 |
Log all applications |
Any |
Internet |
Any Recognized |
Allow |
Log |
Any |
Potential_liabilit
y category. The UserCheck Blocked Message
is shown to users and explains why their traffic is blocked. High Risk
category and blocks the iTunes
application. The UserCheck High Risk Block Message
is shown to users and explains why their traffic is blocked.IT
department network to use the Radmin
application. Traffic that uses Radmin
is allowed only during the Work-Hours
(set to 8:00 through 18:30, for example).HR
network to use Facebook
. The total traffic downloaded from Facebook
is limited to 1 Gbps, there is no upload limit.Streaming Media
, Social Networking
, P2P File Sharing
, and Remote Administration
. The UserCheck Blocked Message
is shown to users and explains why their traffic is blocked.Note - The Remote Administration
category blocks traffic that uses the Radmin
application. If this rule is placed before rule 3, then this rule can also block Radmin
for the IT department.
Use the Hit Count feature to track the number of connections that each rule matches. You can show Hit Count for the rules in these options:
These options are configured in the Access Control Policy Rule Base and also changes how Hit Count is shown in other supported Software Blades.
When you enable Hit Count, the Security Management Server collects the data from supported Security Gateways (from version R75.40 and up). Hit Count works independently from logging and tracks the hits even if the Track option is None.
You can use the Hit Count data to:
Note - If you see a rule with a zero hit count it only means that in the Security Gateways enabled with Hit Count there were no matching connections. There can be matching connections on other Security Gateways. |
By default, Hit Count is globally enabled for all supported Security Gateways (from R75.40). The timeframe setting that defines the data collection time range is configured globally. If necessary, you can disable Hit Count for one or more Security Gateways.
After you enable or disable Hit Count you must install the Policy for the Security Gateway to start or stop collecting data.
To enable or disable Hit Count globally:
To enable or disable Hit Count on each Security Gateway:
These are the options you can configure for how matched connection data is shown in the Hits column:
The values are shown with these letter abbreviations:
For example, 259K represents 259 thousand connections and 2M represents 2 million connections.
The hit count range = Maximum hit value - Minimum hit value (does not include zero hits)
Hit Count Level |
Icon |
Range |
---|---|---|
Zero |
0 hits |
|
Low |
Less than 10 percent of the hit count range |
|
Medium |
Between 10 - 70 percent of the hit count range |
|
High |
Between 70 - 90 percent of the hit count range |
|
Very High |
Above 90 percent of the hit count range |
To show the Hit Count in the Rule Base:
Right-click the heading row of the Rule Base and select Hits.
To configure the Hit Count in a rule:
To update the Hit Count in a rule:
You can configure inspection settings for the Firewall:
The Security Management Server comes with two preconfigured inspection profiles for the Firewall:
When you configure a Security Gateway, the Default Inspection profile is enabled for it. You can also assign the Recommended Inspection profile to the Security Gateway, or to create a custom profile and assign it to the Security Gateway.
To activate the Inspection Settings, install the Access Control Policy.
Note - In a pre-R80 SmartConsole, Inspection Settings are configured as IPS Protections.
To configure Inspection Settings:
The Inspection Settings window opens.
You can:
To edit a setting:
The settings window opens.
Select Capture Packets, if you want to be able to examine packets that were blocked in Drop rules.
To view settings for a certain profile:
Only settings for the selected profiles are shown.
You can add, edit, clone, or delete custom Inspection Settings profiles.
To edit a custom Inspection Settings profile:
To clone an Inspection Settings profile:
To add a new Inspection Settings profile:
To assign an Inspection Settings profile to a Security Gateway:
To configure exceptions to inspection settings:
The Exception Rule window opens.
To enforce the changes, install the Access Control Policy.