Self-Managed Security Gateways

Introduction

R82 introduced a new Dynamic Layer in the Access Control policy to assist customers with highly automated network ‎environments.

This Policy LayerClosed Layer (set of rules) in a Security Policy. serves as a container for rules created directly on the Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. using the GaiaClosed Check Point security operating system that combines the strengths of both SecurePlatform and IPSO operating systems. API call "set-dynamic-content", catering to environments where provisioning, configuration, and other IT processes are regularly managed through the distribution of JSON files.

Workflow:

  1. On the Management ServerClosed Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server., in the Access Control, you create a new Policy Layer and configure it as a Dynamic Layer.

  2. On the Security Gateway, you configure the required Access Control rules in this Dynamic Layer with the Gaia API call "set-dynamic-content" (in the JSON format).

The Dynamic Layer works only as a container for rules that you configure on the Security Gateway. After you run the Gaia API command on the Security Gateway, it ignores all rules in this Dynamic Layer that were configured in SmartConsoleClosed Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on.. If permanent rules are needed (for example, to allow access from a remote API client), you must configure them in the main policy on the Management Server and not in Dynamic Layers.

For additional information, refer to sk182252.

Requirements

  1. Management Server R82 and higher:

  2. Security Gateway R82 and higher:

  3. On the Security Gateway, the user that runs the Gaia API must have this configuration in Gaia OS:

    1. Role: adminRole.

    2. Access Mechanism: Gaia API.

    3. Shell: /bin/cli.sh or /bin/bash

    See the Gaia Administration Guide for your version > User Management chapter> Users and Roles sections.

Limitations

Notes

Configuration

  1. Connect with SmartConsole to the Security Management Server / Domain Management Server.

  2. Add a new Policy Layer and configure it as a Dynamic Layer.

    Notes:

    • You can configure a new Policy Layer directly in a specific policy, or as a shared Policy Layer for several policies.

    • You can configure an Inline Layer (within a specific rule), or an Ordered Layer (a separate set of rules in a dedicated Policy Layer).

      See Ordered Layers and Inline Layers.

    • You can add a new Policy Layer and configure it as a Dynamic Layer either in SmartConsole (described below) or with the Management API call "add-access-layer dynamic-layer true" (see Check Point Management API Reference v1.8 and higher).‎

    Procedure in SmartConsole:

  3. If you run Gaia API calls on the Security Gateway from a remote API client (and not locally on the Security Gateway), make sure your Access Control policy allows such connection to the Security Gateway.

    Best Practice - To avoid losing connectivity loss for the API client, add the applicable rule only in a static Policy Layer (that is not configured as a Dynamic Layer).

  4. Install this Access Control Policy on the Security Gateway / Cluster object.

  5. Run the Gaia API call "set-dynamic-content" on the Security Gateway / each Cluster MemberClosed Security Gateway that is part of a cluster. / Security Group to configure the required dynamic Access Control rules.

    Warning - Pay close attention to the rules you configure on the Security Gateway.

    There is no verification of possible conflicts between the rules configured on the Security Gateway and the rules configured in SmartConsole.

    Notes:

    • Refer to the online Check Point Gaia API Reference (v1.8 and higher) > section System > sub-section Dynamic Content.

      To see the local Gaia API Reference, go to this URL on a Management Server or Security Gateway (R82 or higher):

      https://<IP Address of Gaia Management Interface>/gaia_docs/#web/set-dynamic-content

      At the top of the Gaia API Reference, click the Web Services tab.

    • Because you run Gaia API calls from a remote API client, make sure your Access Control policy allows such connection to the Security Gateway.

      Best Practice - To avoid losing connectivity loss for the API client, add the applicable rule only in a static Policy Layer (that is not configured as a Dynamic Layer).

  6. Optional: Examine the configured dynamic Access Control rules.

    • To see the configured dynamic Access Control rules in a specific Dynamic Layer, run the Gaia API call "show-dynamic-layer" on the Security Gateway / each Cluster Member / Security Group.

    • To see the configured dynamic Access Control rules in all configured Dynamic Layers, run the Gaia API call "show-dynamic-layers" on the Security Gateway / each Cluster Member / Security Group.

Resetting a Dynamic Layer

To remove all dynamic rules, you must reset the Dynamic Layer that contains these rules on the Security Gateway.‎