Working with Thales Luna HSM
Configuration Steps
Use this workflow to configure a Check Point Security Gateway
Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. / ClusterXL / Scalable Platform Security Group
A logical group of Security Appliances (in Maestro) / Security Gateway Modules (on Scalable Chassis) that provides Active/Active cluster functionality. A Security Group can contain one or more Security Appliances / Security Gateway Modules. Security Groups work separately and independently from each other. To the production networks, a Security Group appears a single Security Gateway. In Maestro, each Security Group contains: (A) Applicable Uplink ports, to which your production networks are connected; (B) Security Appliances (the Quantum Maestro Orchestrator determines the applicable Downlink ports automatically); (C) Applicable management port, to which the Check Point Management Server is connected. to work with the Thales Luna HSM Server (formerly, Gemalto SafeNet Network HSM Server).
Use the Thales Luna configuration documents to configure the HSM environment.
The HSM Partition on the Thales Luna HSM should contain these objects:
-
CA certificate
-
CA certificate private key
-
CA certificate public key
-
At least one of the following key pairs for creating Fake Certificate:
-
RSA 1024 key pair
-
RSA 2048 key pair
-
RSA 4096 key pair
-
Optional key pairs for creating Fake Certificate:
-
RSA 1024 key pair
-
RSA 2048 key pair
-
RSA 4096 key pair
-
ECDSA 256 key pair
-
ECDSA 384 key pair
-
ECDSA 521 key pair
This step has three sub-steps.
| Step | Instructions | ||
|---|---|---|---|
|
1 |
In SmartConsole See the R82.10 Threat Prevention Administration Guide > Chapter HTTPS Inspection. |
||
|
2 |
On the Security Gateway / eachCluster Member / Security Group, disable the HSM configuration:
|
||
|
3 |
In SmartConsole, install the applicable Access Control Policy on the Security Gateway / ClusterXL object. |
||
|
4 |
Make sure that HTTPS Inspection works correctly without the HSM Server:
|
|
|
Notes:
|
|
|
Important:
|
Procedure for a Security Gateway / ClusterXL:
| Step | Instructions | |||
|---|---|---|---|---|
|
1 |
Copy the "Luna Minimal Client" to the Check Point Security Gateway / each Cluster Member to some directory (for example, |
|||
|
2 |
Connect to the command line on the Check Point Security Gateway / each Cluster Member. |
|||
|
3 |
Log in to the Expert mode. |
|||
|
4 |
Create the installation directory for the "Luna Minimal Client":
|
|||
|
5 |
Install the "Luna Minimal Client" as described in the Thales Luna HSM Documentation. You must use the installation directory "
|
|||
|
6 |
Copy the libCryptoki2.so file to the /usr/lib/hsm_client/ directory:
|
Procedure for a Scalable Platform Security Group:
| Step | Instructions | |||
|---|---|---|---|---|
|
1 |
Copy the "Luna Minimal Client" to the Check Point Security Group to some directory (for example, |
|||
|
2 |
Connect to the command line on the Check Point Security Group. |
|||
|
3 |
Log in to the Expert mode. |
|||
|
4 |
Create the installation directory for the "Luna Minimal Client":
|
|||
|
5 |
Install the "Luna Minimal Client" as described in the Thales Luna HSM Documentation. You must use the installation directory "
|
|||
|
6 |
Copy the libCryptoki2.so file to the /usr/lib/hsm_client/ directory:
|
|
|
Important:
|
|
|
Notes:
|
| Step | Instructions | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
1 |
Connect to the command line on the Security Gateway / each Cluster Member / Security Group. |
|||||||||||
|
2 |
Log in to Gaia |
|||||||||||
|
3 |
Configure the HSM settings:
|
|||||||||||
|
4 |
Optional: Configure the User Type ID. Some HSM vendors might require or allow logging in with user types other than the default "
|
|||||||||||
|
5 |
Configure the key labels for the RSA fake certificate. At least one key pair is required.
|
|||||||||||
|
6 |
Configure the key labels for the ECDSA fake certificate. At least one key pair is required.
|
|||||||||||
| 7 |
Enable the HSM configuration:
|
|||||||||||
|
8 |
Save the configuration:
|
|||||||||||
|
9 |
Validate the HSM configuration:
|
|||||||||||
|
10 |
Stop and start Check Point services:
|
|||||||||||
|
11 |
Make sure that the Security Gateway / each Cluster Member / Security Group can connect to the HSM Server and that HTTPS Inspection is activated successfully on the outbound traffic.
The output must show:
For more information, see Monitoring HTTPS Inspection with HSM in CLI. |
|||||||||||
|
12 |
Make sure that HTTPS Inspection is activated successfully on the outbound traffic:
|