Large Scale Enterprise Environment

Security Challenge

In complex large-scale enterprise networks, you must control access from the local network to the Internet and to multiple Data Center resources. The Data Center contains sensitive corporate resources and information that must be securely protected from unauthorized access. Grant access only to policy-compliant users and computers. Protect your network and Data Center from malware, bots, and viruses.

Users in the internal networks access Internet resources and applications daily. Not all Internet applications and web sites are secure, and some are restricted by the corporate policy. If you block all internal access, it affects productivity of employees who must have access in the context of their daily work definition. You can control access to the allowed applications with the Application ControlClosed Check Point Software Blade on a Security Gateway that allows granular control over specific web-enabled applications by using deep packet inspection. Acronym: APPI. blade. If you require a granular Access Control Policy works because of user and computer identity, use Access Roles with Application Control.

Configuration Scenario

  1. Configure or use current Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. at the perimeter and in front of the Data Center.

  2. Install the Security Gateway at the perimeter in routing mode, and use at least one external interface to the Internet and one to the internal network (make it an internal interface).

    Best Practice -We recommend that you configure the Security Gateway as an inline device in front of the Data Center in Bridge ModeClosed Security Gateway or Virtual System that works as a Layer 2 bridge device for easy deployment in an existing topology. to avoid network changes.

  3. Make sure that all Security Gateway in the Data Centers and perimeter can communicate directly with each other.

    Best Practice - We recommend that you manage the Security Gateway from one Security Management ServerClosed Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server. and SmartConsoleClosed Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on..

  4. Make sure that there is connectivity from each Security Gateway to the Active Directory internal domain controllers.

  5. Make sure that in an "Any Any Any Accept" Policy, users from the LAN can connect to the applicable resources.

  6. Make sure there are no NAT or Proxy servers between the gateway and your network.

    Best Practice - We recommend that you put your Proxy server in the DMZ network.

Configuration Procedure

  1. Enable Identity AwarenessClosed Check Point Software Blade on a Security Gateway that enforces network access and audits data based on network location, the identity of the user, and the identity of the computer. Acronym: IDA. on the Security Gateway.

  2. Select the identity source method for each Security Gateway, at the perimeter and at the Data Center.

  3. Create Access Roles for users, and apply Access Roles to the applicable Firewall security rules.

  4. Add Access Roles to the Policy.

  5. On the Gateway Properties > Identity Awareness tab, select Share local identities with other gateways.

  6. Install the Policy on the perimeter Security Gateway.

Item

Description

1

Corporate data centers.

2

Identity Awareness Gateway protects the data center.

3

Perimeter Identity Awareness Gateway.

User IDs go to the gateways that protect the data centers.

4

Internal network resources.

5

LDAP server (for example Active Directory).

6

Internet.

Best Practice:

To make a specified list of Security Gateways that share between them identity information:

  1. Open Gateway Properties > Identity Awareness.

  2. Select Get identities from other gateways.

  3. Select the Security Gateway with the identities.