Configuring a Single VSX Gateway in Monitor Mode
|
Important:
|
|
Note - This procedure applies to both Check Point Appliances and Open Servers. |
Procedure:
-
Install the VSX Gateway
Important - Make sure the VSX Gateway has enough physical interfaces.
Step
Instructions
1
Install the Gaia
Check Point security operating system that combines the strengths of both SecurePlatform and IPSO operating systems. Operating System:
2
3
During the First Time Configuration Wizard, you must configure these settings:
-
In the Management Connection window, select the interface, through which you connect to Gaia operating system.
-
In the Internet Connection window, do not configure IP addresses.
-
In the Installation Type window, select Security Gateway and/or Security Management.
-
In the Products window:
-
In the Products section, select Security Gateway
Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. only.
-
In the Clustering section, clear Unit is a part of a cluster, type.
-
-
In the Dynamically Assigned IP window, select No.
-
In the Secure Internal Communication window, enter the applicable Activation Key (between 4 and 127 characters long).
-
-
Configure the Monitor Mode on the applicable interface
You can configure the Monitor Mode on an interface either in Gaia Portal
Web interface for the Check Point Gaia operating system., or Gaia Clish
The name of the default command line shell in Check Point Gaia operating system. This is a restricted shell (role-based administration controls the number of commands available in the shell)..
Configuring the Monitor Mode in Gaia Portal
Step
Instructions
1
With a web browser, connect to Gaia Portal at:
https://<IP address of Gaia Management Interface>
If you changed the default port of Gaia Portal from 443, then you must also enter it (
https://<IP address>:<Port>
).2
In the left navigation tree, click Network Management > Network Interfaces.
3
Select the applicable physical interface from the list and click Edit.
4
Select the Enable option to set the interface status to UP.
5
In the Comment field, enter the applicable comment text (up to 100 characters).
6
On the IPv4 tab, select Use the following IPv4 address, but do not enter an IPv4 address.
7
On the IPv6 tab, select Use the following IPv6 address, but do not enter an IPv6 address.
Important - This setting is available only after you enable the IPv6 Support in Gaia and reboot.
8
On the Ethernet tab:
-
Select Auto Negotiation, or select a link speed and duplex setting from the list.
-
In the Hardware Address field, enter the Hardware MAC address (if not automatically received from the NIC).
Caution - Do not manually change the MAC address unless you are sure that it is incorrect or has changed. An incorrect MAC address can lead to a communication failure.
-
In the MTU field, enter the applicable Maximum Transmission Unit (MTU) value (minimal value is 68, maximal value is 16000, and default value is 1500).
-
Select Monitor Mode.
9
Click OK.
Configuring the Monitor Mode in Gaia Clish
Step
Instructions
1
Connect to the command line on the Security Gateway.
2
Log in to Gaia Clish.
3
Examine the configuration and state of the applicable physical interface:
show interface <Name of Physical Interface>
4
If the applicable physical interface has an IP address assigned to it, remove that IP address.
-
To remove an IPv4 address:
delete interface <Name of Physical Interface> ipv4-address
-
To remove an IPv6 address:
delete interface <Name of Physical Interface> ipv6-address
5
Enable the Monitor Mode on the physical interface:
set interface <Name of Physical Interface> monitor-mode on
6
Configure other applicable settings on the interface in the Monitor Mode:
set interface <Name of Physical Interface> ...
7
Examine the configuration and state of the Monitor Mode interface:
show interface <Name of Physical Interface>
8
Save the configuration:
save config
-
-
Configure the VSX Gateway to process packets that arrive in the wrong order
Step
Instructions
1
Connect to the command line on the VSX Gateway.
2
Log in to the Expert mode.
3
Modify the
$FWDIR/boot/modules/fwkern.conf
file:-
Back up the current
$FWDIR/boot/modules/fwkern.conf
file:cp -v $FWDIR/boot/modules/fwkern.conf{,_BKP}
If this file does not exist, create it:
touch $FWDIR/boot/modules/fwkern.conf
-
Edit the current
$FWDIR/boot/modules/fwkern.conf
file:vi $FWDIR/boot/modules/fwkern.conf
Important - This configuration file does not support spaces or comments.
-
Add this line to enable the Passive Streaming Layer (PSL) Tap Mode:
psl_tap_enable=1
-
Add this line to enable the Firewall Tap Mode:
fw_tap_enable=1
-
Save the changes in the file and exit the Vi editor.
4
Modify the
$PPKDIR/conf/simkern.conf
file:-
Back up the current
$PPKDIR/conf/simkern.conf
file:cp -v $PPKDIR/conf/simkern.conf{,_BKP}
If this file does not exist, create it:
touch $PPKDIR/conf/simkern.conf
-
Edit the current
$PPKDIR/conf/simkern.conf
file:vi $PPKDIR/conf/simkern.conf
Important - This configuration file does not support spaces or comments.
-
Add this line to enable the Firewall Tap Mode:
fw_tap_enable=1
-
Save the changes in the file and exit the Vi editor.
5
Reboot the VSX Gateway.
6
Make sure the VSX Gateway loaded the new configuration:
-
Examine the status of the PSL Tap Mode:
fw ctl get int psl_tap_enable
Output must show:
psl_tap_enable = 1
-
Examine the status of the Firewall Tap Mode:
fw ctl get int fw_tap_enable
Output must show:
fw_tap_enable = 1
Notes:
-
This configuration helps the VSX Gateway process packets that arrive in the wrong or abnormal order (for example, TCP [SYN-ACK] arrives before TCP [SYN]).
-
This configuration helps the VSX Gateway work better for the first 10-30 minutes when it processes connections, in which the TCP [SYN] packets did not arrive.
-
This configuration is also required when you use a TAP device or Mirror / Span ports with separated TX/RX queues.
-
This configuration will make the Mirror Port on VSX Gateway work better for the first 10-30 minutes when processing connections, in which the TCP-SYN packet did not arrive.
-
It is not possible to set the value of the kernel parameters "
psl_tap_enable
" and "fw_tap_enable
" on-the-fly with the "fw ctl set int <parameter>
" command (Known Limitation 02386641).
-
-
Configure the VSX Gateway object in SmartConsole
Step
Instructions
1
Connect with SmartConsole
Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on. to the Security Management Server
Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server. or Main Domain Management Server
Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server. that should manage this VSX Gateway.
2
From the left navigation panel, click Gateways & Servers.
3
Create a new VSX Gateway object in one of these ways:
-
From the top toolbar, click the New (
) > VSX > Gateway.
-
In the top left corner, click Objects menu > More object types > Network Object > Gateways and Servers > VSX > New Gateway.
-
In the top right corner, click Objects Pane > New > More > Network Object > Gateways and Servers > VSX > Gateway.
The VSX Gateway Wizard opens.
4
On the VSX Gateway General Properties (Specify the object's basic settings) page:
-
In the Enter the VSX Gateway Name field, enter the applicable name for this VSX Gateway object.
-
In the Enter the VSX Gateway IPv4 field, enter the same IPv4 address that you configured on the Management Connection page of the VSX Gateway's First Time Configuration Wizard.
-
In the Enter the VSX Gateway IPv6 field, enter the same IPv6 address that you configured on the Management Connection page of the VSX Gateway's First Time Configuration Wizard.
-
In the Select the VSX Gateway Version field, select R81.
-
Click Next.
5
On the VSX Gateway General Properties (Secure Internal Communication) page:
-
In the Activation Key field, enter the same Activation Key you entered during the VSX Gateway's First Time Configuration Wizard.
-
In the Confirm Activation Key field, enter the same Activation Key again.
-
Click Initialize.
-
Click Next.
If the Trust State field does not show Trust established, perform these steps:
-
Connect to the command line on the VSX Gateway.
-
Make sure there is a physical connectivity between the VSX Gateway and the Management Server (for example, pings can pass).
-
Run:
cpconfig
-
Enter the number of this option:
Secure Internal Communication
-
Follow the instructions on the screen to change the Activation Key.
-
In SmartConsole, on the VSX Gateway General Properties page, click Reset.
-
Enter the same Activation Key you entered in the
cpconfig
menu. -
In SmartConsole, click Initialize.
6
On the VSX Gateway Interfaces (Physical Interfaces Usage) page:
-
Examine the list of the interfaces - it must show all the physical interfaces on the VSX Gateway.
-
If you plan to connect more than one Virtual System directly to the same physical interface, you must select VLAN Trunk for that physical interface.
-
Click Next.
7
On the Virtual Network Device Configuration (Specify the object's basic settings) page:
-
You can select Create a Virtual Network Device and configure the first applicable Virtual Network Device at this time (we recommend to do this later) - Virtual Switch or Virtual Router.
-
Click Next.
8
On the VSX Gateway Management (Specify the management access rules) page:
-
Examine the default access rules.
-
Select the applicable default access rules.
-
Configure the applicable source objects, if needed.
-
Click Next.
Important - These access rules apply only to the VSX Gateway (context of VS0), which is not intended to pass any "production" traffic.
9
On the VSX Gateway Creation Finalization page:
-
Click Finish and wait for the operation to finish.
-
Click View Report for more information.
-
Click Close.
10
Examine the VSX configuration:
-
Connect to the command line on the VSX Gateway.
-
Log in to the Expert mode.
-
Run:
vsx stat -v
11
Install the default policy on the VSX Gateway object:
-
Click Install Policy.
-
In the Policy field, select the default policy for this VSX Gateway object.
This policy is called:
<Name of VSX Gateway object>_VSX
-
Click Install.
12
Examine the VSX configuration:
-
Connect to the command line on the VSX Gateway.
-
Log in to the Expert mode.
-
Run:
vsx stat -v
-
-
Configure the Virtual System object (and other Virtual Devices) in SmartConsole
Step
Instructions
1
Connect with SmartConsole to the Security Management Server, or each Target Domain Management Server that should manage each Virtual Device.
2
Configure the applicable Virtual System (and other Virtual Devices) on this VSX Gateway.
When you configure this Virtual System, for the Monitor Mode interface, add a regular interface. In the IPv4 Configuration section, enter a random IPv4 address.
Important - This random IPv4 address must not conflict with existing IPv4 addresses on your network.
3
Examine the VSX configuration:
-
Connect to the command line on the VSX Gateway.
-
Log in to the Expert mode.
-
Run:
vsx stat -v
4
Disable the Anti-Spoofing on the interface that is configured in the Monitor Mode:
-
In the SmartConsole, open the Virtual System object.
-
Click the Topology page.
-
Select the Monitor Mode interface and click Edit.
The Interface Properties window opens.
-
Click the General tab.
-
In the Security Zone field, select None.
-
Click the Topology tab.
-
In the Topology section, make sure the settings are Internal (leads to the local network) and Not Defined.
-
In the Anti-Spoofing section, clear Perform Anti-Spoofing based on interface topology.
-
Click OK to close the Interface Properties window.
-
Click OK to close the Virtual System Properties window.
-
The Management Server pushes the VSX Configuration.
-
-
Configure the required Global Properties for the Virtual System in SmartConsole
Step
Instructions
1
Connect with SmartConsole to the Security Management Server or Target Domain Management Server that manages this Virtual System.
2
In the top left corner, click . > Global properties
3
From the left tree, click the Stateful Inspection pane and configure:
-
In the Default Session Timeouts section:
-
Change the value of the TCP session timeout from the default 3600 to 60 seconds.
-
Change the value of the TCP end timeout from the default 20 to 5 seconds.
-
-
In the Out of state packets section, you must clear all the boxes.
Otherwise, the Virtual System drops the traffic as out of state (because the traffic does not pass through the Virtual System, it does not record the state information for the traffic).
4
From the left tree, click the Advanced page > click the Configure button, and configure:
-
Click FireWall-1 > Stateful Inspection.
-
Clear reject_x11_in_any.
-
Click OK to close the Advanced Configuration window.
5
Click OK to close the Global Properties window.
6
Publish the SmartConsole session.
-
-
Configure the required Access Control policy for the Virtual System in SmartConsole
Step
Instructions
1
Connect with SmartConsole to the Security Management Server or Target Domain Management Server that manages this Virtual System.
2
From the left navigation panel, click Security Policies
Collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection..
3
Create a new policy and configure the applicable layers:
-
At the top, click the + tab (or press the CTRL T keys).
-
On the Manage Policies tab, click Manage policies and layers.
-
In the Manage policies and layers window, create a new policy and configure the applicable layers.
-
Click Close.
-
On the Manage Policies tab, click the new policy you created.
4
Create the Access Control rule
Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause specified actions to be taken for a communication session. that accepts all traffic:
5
Best Practice
We recommend these Aggressive Aging settings for the most common TCP connections:
-
In the SmartConsole, click Objects menu > Object Explorer.
-
Open Services and select TCP.
-
Search for the most common TCP connections in this network.
-
Double-click the applicable TCP service.
-
From the left tree, click Advanced.
-
At the top, select Override default settings.
On Domain Management Server, select Override global domain settings.
-
Select Match for 'Any'.
-
In the Aggressive aging section:
-
Select Enable aggressive aging.
-
Select Specific and enter 60.
-
-
Click OK.
-
Close the Object Explorer.
6
Publish the SmartConsole session.
7
Install the Access Control Policy on the Virtual System object.
-
Click Install Policy.
-
In the Policy field, select the applicable policy for this Virtual System object.
-
Click Install.
8
Examine the VSX configuration:
-
Connect to the command line on the VSX Gateway.
-
Log in to the Expert mode.
-
Run:
vsx stat -v
-
-
Make sure the VSX Gateway enabled the Monitor Mode for Software Blades
Step
Instructions
1
Connect to the command line on the VSX Gateway.
2
Log in to the Expert mode.
3
Install the default policy on the VSX Gateway object:
Make sure the parameter fw_span_port_mode is part of the installed policy:
grep -A 3 -r fw_span_port_mode $FWDIR/state/local/*
The returned output must show:
:val (true)
-
Connect the VSX Gateway to the switch
On the VSX Gateway, connect the interface in the Monitor Mode to the mirror or SPAN port on the switch.
For more information, see the: