Updatable Objects

Introduction to Updatable Objects

An Updatable Object is a network object that represents an external service, such as Office 365, AWS, GEO locations, and more. External services providers publish lists of IP addresses or Domains or both to allow access to their services. These lists are dynamically updated.

Updatable objects derive their contents from these published lists of the providers, which Check Point uploads to the Check Point cloud. The updatable objects are updated automatically on the Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. each time the provider changes a list. There is no need to install policy for the updates to take effect.

You can use updatable objects in all three types of policies: Access Control, Threat Prevention, and HTTPS InspectionClosed Feature on a Security Gateway that inspects traffic encrypted by the Secure Sockets Layer (SSL) protocol for malware or suspicious patterns. Synonym: SSL Inspection. Acronyms: HTTPSI, HTTPSi..

You can use an updatable object in the Access Control, Threat Prevention or the HTTPS Inspection policy as a Source or a Destination. In the Threat Prevention policy, you can also use an updatable object as the Protected Scope.

Notes:

  • For Access Control, this feature is supported on Security Gateways R80.20 and higher.

  • For Threat Prevention and HTTPS Inspection, this feature is supported on Security Gateways R80.40 and higher.

  • Updatable Objects cannot be added to a network group.

Adding an Updatable Object to the Access Control Policy

  1. Make sure the Security Management ServerClosed Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server. / Domain Management ServerClosed Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server. and the Security Gateway have access to the Check Point cloud in the Internet (see sk83520).

  2. Connect with SmartConsoleClosed Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on. to the Security Management Server / Domain Management Server.

  3. From the left navigation panel, click Security Policies.

  4. In the top panel, click Access Control > Policy.

  5. Add a new ruleClosed Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause specified actions to be taken for a communication session. in the required position.

  6. In the Destination column, click the + icon.

    Note - You can also add Updated objects in the Source column.

  7. In the top right corner, click Import > Updatable Objects.

    The Updatable Objects window opens.

  8. Select the Updatable objects to add.

  9. Click OK.

    The selected Updatable objects are added in the rule column.

  10. Configure other columns in this rule.

  11. Publish the SmartConsole session.

  12. Install the Access Control Policy.

Adding an Updatable Object to the Custom Threat Prevention Policy

  1. Make sure the Security Management Server / Domain Management Server and the Security Gateway have access to the Check Point cloud in the Internet (see sk83520).

  2. Connect with SmartConsole to the Security Management Server / Domain Management Server.

  3. From the left navigation panel, click Security Policies.

  4. In the top panel, click Threat Prevention > Custom Policy.

  5. Add a new rule in the required position.

  6. In the Protected Scope column, click the + icon.

  7. In the top right corner, click Import > Updatable Objects.

    The Updatable Objects window opens.

    Note - You can also add objects to the Source column.

  8. Select the Updatable objects to add.

  9. Click OK.

    The selected Updatable objects are added in the rule column.

  10. Configure other columns in this rule.

  11. Publish the SmartConsole session.

  12. Install the Threat Prevention Policy.

Adding an Updatable Object to the HTTPS Inspection Policy

  1. Make sure the Security Management Server / Domain Management Server and the Security Gateway have access to the Check Point cloud in the Internet (see sk83520).

  2. Connect with SmartConsole to the Security Management Server / Domain Management Server.

  3. From the left navigation panel, click Security Policies.

  4. In the top panel, click the applicable policy:

    • HTTPS Inspection > Inbound Policy

    • HTTPS Inspection > Outbound Policy

  5. Add a new rule in the required position.

  6. In the Destination column, click the + icon.

    Note - You can also add Updated objects in the Source column.

  7. In the top right corner, click Import > Updatable Objects.

    The Updatable Objects window opens.

  8. Select the Updatable objects to add.

  9. Click OK.

    The selected Updatable objects are added in the rule column.

  10. Configure other columns in this rule.

  11. Publish the SmartConsole session.

  12. Install the HTTPS Inspection Policy.

Monitoring Updatable Objects

You can monitor how the Updatable Objects update their corresponding IP addresses in SmartConsole or SmartView in the Logs & Events view > the Logs tab.

Follow the most applicable procedure for you.

Updating the Updatable Objects through the Management Server

Important - This feature is available in the R81.20 Jumbo Hotfix Accumulator, Take 96 and higher (PMTR-102617).

If your Security Gateway is not connected to the Internet, then it can get the updates for the Updatable Objects through the Management Server (that would act as a proxy server):

  1. Connect to the command line on the Security Gateway / each Cluster MemberClosed Security Gateway that is part of a cluster. / Scalable Platform Security Group.

  2. Log in to the Expert mode.

  3. Back up the current configuration file:

    cp -v $CPDIR/conf/downloads/dl_prof_ONLINE_SERVICES.xml{,_BKP}

  4. Edit the current configuration file:

    vi $CPDIR/conf/downloads/dl_prof_ONLINE_SERVICES.xml

  5. Change the value of the "ProxyRoute" parameter from 0 to 1:

    <ProxyRoute>1</ProxyRoute>

    Example (refer to the bottom of the file):

    Copy
    <?xml version="1.0" encoding="UTF-8"?>
    <DownloadPreferences>
        <ModuleName>Online_Services</ModuleName>
        <ID>111</ID>
        <Version>1.0</Version>
        <Files>online_services_gw.tgz</Files>
        <DeletionMethod>2</DeletionMethod>
        <Interval>120</Interval>
        <SVT_Log_ID>Firewall</SVT_Log_ID>
        <SVT_Log_Desc>IPs and Domains for Online Services objects</SVT_Log_Desc>
        <SVT_Log_Severity>2</SVT_Log_Severity>
        <SVT_Log_Failure_Impact>Online Services objects update has failed</SVT_Log_Failure_Impact>
        <CK_Identifier>fw1:6.0:xlate</CK_Identifier>
        <CK_Identifier>fw1:6.0:auth</CK_Identifier>
        <CK_Identifier>fw1:6.0:content</CK_Identifier>
        <URL>https://updates.checkpoint.com/WebService/services/DownloadMetaDataService?wsdl</URL>
        <Updatable>Yes</Updatable>
        <ProxyRoute>1</ProxyRoute>
    </DownloadPreferences>
  6. Save the changes in the file and exit the editor.

  7. On Scalable Platform Security Group, copy the modified file to all Security Group Members:

    asg_cp2blades $CPDIR/conf/downloads/dl_prof_ONLINE_SERVICES.xml