Self-Managed Security Gateways
Introduction
R82 introduced a new Dynamic Layer in the Access Control policy to assist customers with highly automated network environments.
This Policy Layer Layer (set of rules) in a Security Policy. serves as a container for rules created directly on the Security Gateway Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. using the Gaia Check Point security operating system that combines the strengths of both SecurePlatform and IPSO operating systems. API call "set-dynamic-content
", catering to environments where provisioning, configuration, and other IT processes are regularly managed through the distribution of JSON files.
Workflow:
-
On the Management Server Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server., in the Access Control, you create a new Policy Layer and configure it as a Dynamic Layer.
-
On the Security Gateway, you configure the required Access Control rules in this Dynamic Layer with the Gaia API call "
set-dynamic-content
" (in the JSON format).
The Dynamic Layer works only as a container for rules that you configure on the Security Gateway. After you run the Gaia API command on the Security Gateway, it ignores all rules in this Dynamic Layer that were configured in SmartConsole Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on.. If permanent rules are needed (for example, to allow access from a remote API client), you must configure them in the main policy on the Management Server and not in Dynamic Layers.
For additional information, refer to sk182252.
Requirements
-
Management Server R82 and higher:
-
Security Gateway R82 and higher:
-
Single Security Gateway
-
ClusterXL
-
Security Group in Maestro or Scalable Chassis
-
-
On the Security Gateway, the user that runs the Gaia API must have this configuration in Gaia OS:
-
Role:
adminRole
. -
Access Mechanism: Gaia API.
-
Shell:
/bin/cli.sh or /bin/bash
See the Gaia Administration Guide for your version > User Management chapter> Users and Roles sections.
-
Limitations
-
This feature was designed for the JSON format.
Use a 3rd-party REST API client that allows you to paste the required API body in the JSON format.
Do not use the Check Point CLI API client "
mgmt_cli
". -
It is not supported to edit or delete individual dynamic rules on the Security Gateway after you add them.
-
To change an individual dynamic rule Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause specified actions to be taken for a communication session., you must run the Gaia API call "
set-dynamic-content
" with the updated API body that contains the complete Access Control rules and the updated parameters and values for that individual rule. -
To delete an individual dynamic rule, you must run the Gaia API call "
set-dynamic-content
" with the updated API body that contains the complete Access Control rules without that individual rule.
Notes:
-
To see the current rules and to copy the current complete JSON, run the Gaia API call "
show-dynamic-layer
" on the Security Gateway. -
If necessary, you can delete all rules in the Dynamic Layer on the Security Gateway. See Resetting a Dynamic Layer.
-
-
VSNext Virtual Gateway is not supported.
-
Legacy VSX Virtual System Extension. Check Point virtual networking solution, hosted on a computer or cluster with virtual abstractions of Check Point Security Gateways and other network devices. These Virtual Devices provide the same functionality as their physical counterparts. Virtual System (on a VSX Gateway Physical server that hosts VSX virtual networks, including all Virtual Devices that provide the functionality of physical network devices. It holds at least one Virtual System, which is called VS0. or VSX Cluster) is not supported.
-
Legacy VSX Virtual Router (on a VSX Gateway or VSX Cluster) is not supported.
Notes
-
Each Policy Package Collection of different types of Security Policies, such as Access Control, Threat Prevention, QoS, and Desktop Security. After installation, Security Gateways enforce all Policies in the Policy Package. supports more than one Dynamic Layer as an or as an Ordered Layer. For example, different administrators can use different Policy Layers.
-
The Security Gateway applies the Access Control rules in the order of the Policy Layers in the Policy Package.
-
Rules that you configure in the Dynamic Layer apply until you run the Gaia API call "
set-dynamic-content
" for the first time on the Security Gateway. -
If you delete the Dynamic Layer from the Policy Package (or clear the checkbox Set as a Dynamic Layer in the Dynamic Layer) and install the Access Control policy, then the Security Gateway removes all dynamic rules and applies only the static rules configured in SmartConsole.
-
SmartConsole does not show rules in the Dynamic Layer that you configure on the Security Gateway.
-
To see the list of the supported objects in the Dynamic Layer, refer to the API call "
set-dynamic-content
" > section "Request Body
" > parameter "objects
".
Configuration
-
Connect with SmartConsole to the Security Management Server / Domain Management Server.
-
Add a new Policy Layer and configure it as a Dynamic Layer.
Notes:
-
You can configure a new Policy Layer directly in a specific policy, or as a shared Policy Layer for several policies.
-
You can configure an Ordered Layer (a separate set of rules in a dedicated Policy Layer).
(within a specific rule), or an -
You can add a new Policy Layer and configure it as a Dynamic Layer either in SmartConsole (described below) or with the Management API call "
add-access-layer dynamic-layer true
" (see Check Point Management API Reference v1.8 and higher).
Procedure in SmartConsole:
To configure an Ordered Layer in a specific Access Control policy-
In the top left corner, click Menu > Manage policies and layers.
-
In the left panel, click Policies.
-
Right-click the applicable Policy Package and click Edit.
-
In the Access Control section, click the + icon.
-
In the top right corner, click New Layer.
-
Enter the name for this Policy Layer.
-
On the General page:
In the Blades section, select the supported blades:
-
Mandatory: Firewall
-
Optional: Application & URL Filtering
-
-
On the Advanced page:
-
In the Implicit Cleanup Action section, select the option Drop (default).
This Drop rules makes sure to drop all traffic that matches this Ordered Layer until you run the Gaia API call "
set-dynamic-content
" on the Security Gateway.You can change it later in SmartConsole.
-
In the Dynamic Layer section, select Set as a Dynamic Layer.
-
-
On the Permissions page, select the permission profiles that can edit the Dynamic Layer. This is essential when multiple Dynamic Layers are used, each configured by different users. Only the profiles shown here can edit the Layer. To add additional profiles that can edit the Layer, go to the bottom of the Permissions page.
To create a new permission profile, in SmartConsole, go to the Manage & Settings view > Permissions & Administrators > Permission Profiles. In the profile editor, go to Access Control > Policy, and make sure Edit layers by the selected profile in a layer editor is selected.
-
Click OK to close the Layer Editor window.
-
In the policy, to the right of the Access Control section, you now see the Layer called Network (default name) and the new Dynamic Layer.
Important - You can change the order of these Policy Layers.
-
Click OK to close the Policy window.
To configure an Access Control policy in a specific rule in a specific-
From the left navigation panel, click Security Policies Collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection..
-
If you need to open a different Security Policy:
-
At the top, click the [+] tab.
-
Click the required policy.
-
-
In the Access Control section, click Policy.
-
Locate the applicable rule.
-
In the rule, click in the Action cell > click > click New Layer.
-
Enter the name for this Policy Layer.
-
On the General page, in the Blades section, select the supported blades:
-
Mandatory: Firewall
-
Optional: Application & URL Filtering
-
Optional: In the Sharing section, select Multiple policies and rules can use this layer.
-
On the Advanced page:
-
In the Implicit Cleanup Action section, select the option Accept.
This makes sure to accept traffic that matches this Gaia API call "
until you run theset-dynamic-content
" on the Security Gateway.You can change it later in SmartConsole.
-
In the Dynamic Layer section, select Set as a Dynamic Layer.
-
-
On the Permissions page, select the permission profiles that can edit the Dynamic Layer. This is essential when multiple Dynamic Layers are used, each configured by different users. Only the profiles shown here can edit the Layer. To add additional profiles that can edit the Layer, go to the bottom of the Permissions page.
To create a new permission profile, in SmartConsole, go to the Manage & Settings view > Permissions & Administrators > Permission Profiles. In the profile editor, go to Access Control > Policy, and make sure Edit layers by the selected profile in a layer editor is selected.
-
Click OK to close the Layer Editor window.
-
In the rule, you now see the new
.
To configure a shared Ordered Layer to use in several Access Control Policies-
In the top left corner, click Menu > Manage policies and layers.
-
In the left panel, click Layers > Access Control.
-
From the top tool bar, click New.
-
Enter the name for this Policy Layer.
-
On the General page, in the Blades section, select the supported blades:
-
Mandatory: Firewall
-
Optional: Application & URL Filtering
-
Optional: In the Sharing section, select Multiple policies and rules can use this layer.
-
-
On the Advanced page:
-
In the Implicit Cleanup Action section, select the option Drop.
This Drop rules makes sure to drop all traffic that matches this Ordered Layer until you run the Gaia API call "
set-dynamic-content
" on the Security Gateway.You can change it later in SmartConsole.
-
In the Dynamic Layer section, select Set as a Dynamic Layer.
-
-
On the Permissions page, select the permission profiles that can edit the Dynamic Layer. This is essential when multiple Dynamic Layers are used, each configured by different users. Only the profiles shown here can edit the Layer. To add additional profiles that can edit the Layer, go to the bottom of the Permissions page.
To create a new permission profile, in SmartConsole, go to the Manage & Settings view > Permissions & Administrators > Permission Profiles. In the profile editor, go to Access Control > Policy, and make sure Edit layers by the selected profile in a layer editor is selected.
-
Click OK to close the Layer Editor window.
-
In the left panel, click Policies.
-
Right-click the applicable Policy Package and click Edit.
-
In the Access Control section, click the + icon.
-
Click the new Dynamic Layer.
-
In the policy, to the right of the Access Control section, you now see the Layer called Network (default name) and the new Dynamic Layer.
Important - You can change the order of these Policy Layers.
-
Click OK to close the Policy window.
-
Click Close to close the Manage policies and layers window.
-
-
If you run Gaia API calls on the Security Gateway from a remote API client (and not locally on the Security Gateway), make sure your Access Control policy allows such connection to the Security Gateway.
Best Practice - To avoid losing connectivity loss for the API client, add the applicable rule only in a static Policy Layer (that is not configured as a Dynamic Layer).
-
Install this Access Control Policy on the Security Gateway / Cluster object.
-
Run the Gaia API call "
set-dynamic-content
" on the Security Gateway / each Cluster Member Security Gateway that is part of a cluster. / Security Group to configure the required dynamic Access Control rules.Warning - Pay close attention to the rules you configure on the Security Gateway.
There is no verification of possible conflicts between the rules configured on the Security Gateway and the rules configured in SmartConsole.
Notes:
-
Refer to the online Check Point Gaia API Reference (v1.8 and higher) > section System > sub-section Dynamic Content.
To see the local Gaia API Reference, go to this URL on a Management Server or Security Gateway (R82 or higher):
https://<IP Address of Gaia Management Interface>/gaia_docs/#web/set-dynamic-content
At the top of the Gaia API Reference, click the Web Services tab.
-
Because you run Gaia API calls from a remote API client, make sure your Access Control policy allows such connection to the Security Gateway.
Best Practice - To avoid losing connectivity loss for the API client, add the applicable rule only in a static Policy Layer (that is not configured as a Dynamic Layer).
Workflow for a remote REST API client (based on the Postman application)-
Install the Postman application.
-
Get the Gaia REST API collection from sk143612.
-
Import the Gaia REST API collection into the Postman application (first, you must create a Postman account). Refer to the Postman documentation about the import methods.
-
Configure the required API variables:
-
In the left panel, in the Gaia REST API collection, click the top folder Gaia API.
-
Add these variables:
Variable Name
Variable Value
Comment
username
Username of the applicable user in the Gaia OS on the Security Gateway.
The default user is
admin
.You can create other users (see the Requirements section).
password
Password of the applicable user in the Gaia OS on the Security Gateway.
You configure this password.
ip
IP Address of the Gaia Management Interface (1) Interface on a Gaia Security Gateway or Cluster member, through which Management Server connects to the Security Gateway or Cluster member. (2) Interface on Gaia computer, through which users connect to Gaia Portal or CLI. on the Security Gateway / each Cluster Member / Security Group.
This is the IP address on the Security Gateway / each Cluster Member / Security Group, to which the API client connects.
sid
Initially, empty.
Use this variable to contain the required SID after running the Gaia API call "
login
".
-
-
Get the Login Session ID (SID):
-
In the left pane, open the folder Session Management.
-
Click the API call "login".
-
In the top right corner, click Send.
-
In the bottom panel, copy the value of the parameter "sid".
-
-
Configure the SID variable:
-
In the left panel, click the top folder Gaia API.
-
In the sid variable, enter the copied value in the column Current Value.
-
In the top right corner, click Save.
-
-
Run the API call "
set-dynamic-content
" on the Security Gateway / each Cluster Member / Scalable Platform Security Group:-
In the left panel, click the API "set-dynamic-content".
-
At the top, click the Body tab.
-
Configure the required parameters and values in the JSON format.
-
In the top right corner, click Send.
-
In the bottom panel, copy the entire response with a Task ID.
-
In the left panel, open the Misc folder, and click the API call "show task".
-
At the top, click the Body tab and click the raw option.
-
Paste the entire response with the Task ID.
-
In the top right corner, click Send.
-
In the bottom panel, see the API response for the API call "
set-dynamic-content
".
-
-
-
Optional: Examine the configured dynamic Access Control rules.
-
To see the configured dynamic Access Control rules in a specific Dynamic Layer, run the Gaia API call "
show-dynamic-layer
" on the Security Gateway / each Cluster Member / Security Group. -
To see the configured dynamic Access Control rules in all configured Dynamic Layers, run the Gaia API call "
show-dynamic-layers
" on the Security Gateway / each Cluster Member / Security Group.
-
Resetting a Dynamic Layer
To remove all dynamic rules, you must reset the Dynamic Layer that contains these rules on the Security Gateway.
Run the Gaia API call "set-dynamic-content
" on the Security Gateway and use "operation": "reset"
.
Syntax part for a remote REST API client
"access-layers-content": [ { "name": "<Name_of_Dynamic_Layer>", "operation": "reset", "rulebase": [] } ] |