Client and Gateway Communication

In an environment with UserCheck Clients, the Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. acts as a server for the clients. Each client must be able to discover the server and create trust with it.

To create trust, the client makes sure that the server is the correct one. It compares the server fingerprint calculated during the SSL handshake with the expected fingerprint. If the server does not have the expected fingerprint, the client asks the user to manually confirm that the server is correct.

Here is a list of the methods that you can use for clients to discover and trust the server.

Option Comparison

Configuration

Must Have AD

Manual User Trust (one time) Necessary?

Multi-Site

Client Stays Signed?

Still works after Gateway Changes

Level

Recommended for...

File name based

No

Yes

No

Yes

No

Very Simple

Single Security Gateway configurations

AD based

Yes

No

Yes

Yes

Yes

Simple

Configurations with AD that you can modify

DNS based

No

Yes

Partially (per DNS server)

Yes

Yes

Simple

Configurations without AD

With an AD you cannot change, and a DNS that you can change

Remote registry

No

No

Yes

Yes

Yes

Moderate

Where remote registry is used for other purposes

  1. File name based server configuration

    If no other method is configured (default, out-of-the-box situation), all UserCheck Clients downloaded from the portal are renamed to have the portal machine IP address in the filename. During installation, the client uses this IP address to connect to the Security Gateway. Note that the user has to click Trust to manually trust the server.

  2. Active Directory Based Configuration

    If client computers are members of an Active Directory domain, you can configure the server addresses and trust data using a dedicated tool.

  3. DNS SRV Record Based Server Discovery

    Configure the server addresses in the DNS server. Note that the user has to click Trust to manually trust the server.

Remote Registry

All of the client configuration, including the server addresses and trust data reside in the registry. You can configure the values before installing the client (by GPO, or any other system that lets you control the registry remotely). This lets you use the configuration when the client is first installed.