CP R75.20 Firewall Admin Guide
CP R75.20 Firewall Admin Guide
CP R75.20 Firewall Admin Guide
R75.20
Administration Guide
13 July 2011
2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying, distribution, and decompilation. No part of this product or related documentation may be reproduced in any form or by any means without prior written authorization of Check Point. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19. TRADEMARKS: Refer to the Copyright page (http://www.checkpoint.com/copyright.html) for a list of our trademarks. Refer to the Third Party copyright notices (http://www.checkpoint.com/3rd_party_copyright.html) for a list of relevant copyrights and third-party licenses.
Important Information
Latest Software
We recommend that you install the most recent software release to stay up-to-date with the latest functional improvements, stability fixes, security enhancements and protection against new and evolving attacks.
Latest Documentation
The latest version of this document is at: http://supportcontent.checkpoint.com/documentation_download?ID=12267 For additional technical information, visit the Check Point Support Center (http://supportcenter.checkpoint.com).
Revision History
Date 13 July 2011 Description First release of this document
Feedback
Check Point is engaged in a continuous effort to improve its documentation. Please help us by sending your comments (mailto:cp_techpub_feedback@checkpoint.com?subject=Feedback on Firewall R75.20 Administration Guide).
Contents
Important Information .............................................................................................3 Access Control .....................................................................................................10 Check Point Access Control Solution .................................................................10 Rules and the Rule Base ....................................................................................11 Rule Base Elements ......................................................................................11 Implied Rules .................................................................................................12 Order of Rule Enforcement ............................................................................12 Example Access Control Rule........................................................................12 Special Considerations for Access Control ....................................................12 Defining Access Control Rules .......................................................................14 Defining an Access Control Policy ................................................................14 Preventing IP Spoofing .......................................................................................15 Configuring Anti-Spoofing ..............................................................................16 Excluding Specific Internal Addresses ...........................................................17 Legal Addresses ............................................................................................17 Multicast Access Control ....................................................................................18 Multicast Routing Protocols............................................................................18 Dynamic Registration Using IGMP .................................................................18 IP Multicast Group Addressing .......................................................................18 Per-Interface Multicast Restrictions................................................................19 Configuring Multicast Access Control .............................................................20 Cooperative Enforcement ...................................................................................20 Enforcement Mode ........................................................................................21 NAT Environments .........................................................................................21 Monitor Only Deployment Mode .....................................................................21 Configuring Cooperative Enforcement ...........................................................21 End Point Quarantine (EPQ) - Intel AMT .........................................................22 Configuring End Point Quarantine (EPQ) .......................................................22 Authentication.......................................................................................................27 Configuring Authentication..................................................................................27 How the Gateway Searches for Users ...........................................................27 Authentication Schemes .....................................................................................28 Check Point Password ...................................................................................28 Operating System Password ..........................................................................28 RADIUS .........................................................................................................28 SecurID..........................................................................................................30 TACACS ........................................................................................................31 Undefined ......................................................................................................32 Authentication Methods ......................................................................................32 User Authentication .......................................................................................32 Session Authentication ..................................................................................33 Client Authentication ......................................................................................35 Creating Users and Groups ................................................................................40 Creating User Groups ....................................................................................40 Creating a User Template ..............................................................................40 Creating Users ...............................................................................................41 Installing User Information in the Database....................................................41 Configuring Authentication Tracking ...................................................................41 Configuring Policy for Groups of Windows Users ...............................................41 Network Address Translation ..............................................................................42 NAT Modes ........................................................................................................42 Static NAT .....................................................................................................43
Hide NAT .......................................................................................................43 NAT Rule Base...................................................................................................45 Rule Match Order ..........................................................................................45 Automatic and Manual NAT Rules .................................................................46 Bidirectional NAT ...........................................................................................46 Understanding Automatically Generated Rules ..............................................46 Planning Considerations for NAT........................................................................47 Hide Versus Static .........................................................................................47 Automatic Versus Manual Rules ....................................................................47 Choosing the Hide Address in Hide NAT .......................................................48 Specific Deployment Considerations..............................................................48 Configuring NAT .................................................................................................49 General Steps for Configuring NAT................................................................49 Basic Configuration - Network Node with Hide NAT .......................................50 Sample Configuration (Static and Hide NAT) .................................................51 Sample Configuration (Using Manual Rules for Port Translation)...................52 Advanced NAT Configuration .............................................................................52 Connecting Translated Objects on Different Interfaces ..................................52 Internal Communication with Overlapping Addresses ....................................52 Security Management Behind NAT ................................................................55 IP Pool NAT ...................................................................................................56 ISP Redundancy ...................................................................................................61 ISP Redundancy Overview .................................................................................61 ISP Redundancy Operational Modes .............................................................62 Monitoring the ISP Links ................................................................................62 How ISP Redundancy Works .........................................................................63 ISP Redundancy Script ..................................................................................64 Manually Changing the Link Status (fw isp_link) ............................................64 ISP Redundancy Deployments ......................................................................64 ISP Redundancy and VPNs ...........................................................................66 Considerations for ISP Link Redundancy ...........................................................67 Choosing the Deployment ..............................................................................67 Choosing the Redundancy Mode ...................................................................68 Configuring ISP Link Redundancy ......................................................................68 Introduction to ISP Link Redundancy Configuration .......................................68 Registering the Domain and Obtaining IP Addresses.....................................68 DNS Server Configuration for Incoming Connections.....................................69 Dialup Link Setup for Incoming Connections..................................................69 SmartDashboard Configuration ......................................................................69 Configuring Default Route for ISP Redundancy Gateway ..............................71 ConnectControl - Server Load Balancing ...........................................................72 Introduction to ConnectControl ...........................................................................72 Load-Balancing Methods ....................................................................................72 ConnectControl Packet Flow ..............................................................................73 Logical Server Types ..........................................................................................73 HTTP .............................................................................................................73 Other .............................................................................................................75 Considering Logical Server Types .................................................................75 Persistent Server Mode ......................................................................................75 Persistency By Server....................................................................................76 Persistency By Service ..................................................................................76 Persistent Server Timeout..............................................................................76 Server Availability ...............................................................................................77 Load Measuring ..................................................................................................77 Configuring ConnectControl ...............................................................................77 Bridge Mode ..........................................................................................................79 Introduction to Bridge Mode................................................................................79 Limitations in Bridge Mode .................................................................................79 Configuring Bridge Mode ....................................................................................80
Bridging Interfaces .........................................................................................80 Configuring Anti-Spoofing ..............................................................................80 Displaying the Bridge Configuration ...............................................................80 CoreXL Administration .........................................................................................82 CoreXL ...............................................................................................................82 Supported Platforms and Features ................................................................82 Default Configuration .....................................................................................82 Performance Tuning ...........................................................................................83 Processing Core Allocation ............................................................................83 Allocating Processing Cores ..........................................................................83 Configuring CoreXL ............................................................................................86 Command Line Reference ..................................................................................86 Affinity Settings ..............................................................................................86 fwaffinity.conf .................................................................................................86 fwaffinty_apply ...............................................................................................87 fw ctl affinity ...................................................................................................88 fw ctl multik stat .............................................................................................89 Anti-Virus ..............................................................................................................90 Anti-Virus Protection ...........................................................................................90 Introduction to Integrated Anti-Virus Protection ..............................................90 Architecture ...................................................................................................90 Configuring Integrated Anti-Virus Scanning ...................................................90 Database Updates .........................................................................................91 Understanding Anti-Virus Scanning Options ..................................................92 Configuring Anti-Virus ....................................................................................98 Logging and Monitoring ...............................................................................100 UTM-1 Edge Anti-Virus ................................................................................100 Anti-Spam and Mail............................................................................................. 101 Introduction to Anti-Spam and Mail Security .....................................................101 Mail Security Overview .....................................................................................102 Anti-Spam ....................................................................................................102 Adaptive Continuous Download ...................................................................104 Configuring Anti-Spam .....................................................................................104 Configuring a Content Anti-Spam Policy ......................................................104 Configuring an IP Reputation Policy.............................................................104 Configuring a Block List ...............................................................................105 Configuring Anti-Spam SMTP ......................................................................105 Configuring Anti-Spam POP3 ......................................................................105 Configuring Network Exceptions ..................................................................105 Configuring an Allow List .............................................................................106 Selecting a Customized Server ....................................................................106 Anti-Spam on UTM-1 Edge Devices ............................................................106 Bridge Mode and Anti-Spam ........................................................................107 Configuring Anti-Virus Protection for Mail .........................................................107 Configuring Mail Anti-Virus...........................................................................107 Configuring Zero Hour Malware Protection ..................................................108 Configuring SMTP and POP3 ......................................................................108 Configuring File Types .................................................................................109 Configuring Settings ....................................................................................109 Configuring a Disclaimer ..................................................................................109 Anti-Spam Logging and Monitoring...................................................................109 Reporting False Positives to Check Point .........................................................110 Anti-Spam Tracking and Reporting Options ......................................................110 SmartView Tracker ......................................................................................111 SmartView Monitor ......................................................................................111 SmartReporter .............................................................................................111 Securing Voice Over IP ...................................................................................... 112 Introduction to the Check Point Solution for Secure VoIP .................................112 Control Signaling and Media Protocols .............................................................113
VoIP Handover .................................................................................................113 When to Enforce Handover ..........................................................................114 VoIP Application Intelligence ............................................................................114 Introduction to VoIP Application Intelligence ................................................114 Restricting Handover Locations Using a VoIP Domain.................................114 Controlling Signaling and Media Connections ..............................................115 Preventing Denial of Service Attacks ...........................................................115 Protocol-Specific Application Intelligence .....................................................115 VoIP Logging ....................................................................................................116 Protocol-Specific Security .................................................................................116 Securing SIP-Based VoIP ............................................................................116 Securing H.323-Based VoIP ........................................................................126 Configuring H.323-Based VoIP ....................................................................131 Securing MGCP-Based VoIP .......................................................................141 Securing SCCP-Based VoIP ........................................................................146 Securing Instant Messaging Applications ........................................................ 151 The Need to Secure Instant Messenger Applications .......................................151 Introduction to Instant Messenger Security .......................................................151 Understanding Instant Messenger Security ......................................................152 NAT Support for MSN Messenger over SIP ......................................................152 NAT Support for MSN Messenger over MSNMS ..............................................152 Logging Instant Messenger Applications ..........................................................153 Configuring SIP-based Instant Messengers ......................................................153 Configuring MSN Messenger over MSNMS ......................................................154 Configuring Skype, Yahoo, ICQ and More ........................................................154 Microsoft Networking Services Security ........................................................... 155 Securing Microsoft Networking Services (CIFS) ...............................................155 Restricting Access to Servers and Shares (CIFS Resource) ............................155 FTP Security ........................................................................................................ 157 Introduction to FTP Content Security ................................................................157 FTP Enforcement by the Firewall Kernel ..........................................................157 FTP Enforcement by the FTP Security Server ..................................................157 Control Allowed Protocol Commands...........................................................157 Maintaining Integrity of Other Protected Services ........................................158 Avoiding Vulnerabilities in FTP Applications ................................................158 Content Security via the FTP Resource .......................................................158 Configuring Restricted Access to Specific Directories.......................................158 Content Security ................................................................................................. 160 Introduction to Content Security........................................................................160 Security Servers ..........................................................................................160 Deploying OPSEC Servers ..........................................................................161 CVP Servers for Anti-Virus and Malicious Content Protection ......................162 TCP Security Server ....................................................................................164 Configuring Content Security ............................................................................165 Resources: What They Are and How to Use Them ......................................165 Creating a Resource and Using it in the Rule Base .....................................165 Configuring Anti-Virus Checking for Incoming Email ....................................166 Configuring CVP for Web Traffic Performance .............................................167 Performing CVP/UFP Inspection on any TCP Service .................................167 Advanced CVP Configuration: CVP Chaining and Load Sharing ......................168 Introduction to CVP Chaining and Load Sharing ..........................................168 CVP Chaining ..............................................................................................168 CVP Load Sharing .......................................................................................169 Combining CVP Chaining and Load Sharing ...............................................169 Configuring CVP Chaining and Load Sharing ..............................................170 Services with Application Intelligence .............................................................. 171 Introduction to Services with Application Intelligence ........................................171 DCE-RPC .........................................................................................................171 SSLv3 Service ..................................................................................................172
SSHv2 Service .................................................................................................172 FTP_BASIC Protocol Type ...............................................................................172 Domain_UDP Service .......................................................................................172 Point-to-Point Tunneling Protocol (PPTP) .........................................................172 Configuring PPTP ........................................................................................173 Blocking Visitor Mode (TCPT) ..........................................................................173 Introduction to TCPT ....................................................................................173 Why Block Visitor Mode and Outgoing TCPT? .............................................173 How the Firewall Identifies TCPT .................................................................173 When to Block Outgoing TCPT ....................................................................174 Blocking Visitor Mode (Blocking Outgoing TCPT) ........................................174 Changing the Port Used to Block Outgoing TCPT ........................................174 Web Content Protection ..................................................................................... 175 Introduction to Web Content Protection ............................................................175 Web Content Security in the Rule Base ............................................................175 What is a URI Resource? ............................................................................175 Filtering URLs ..............................................................................................175 URL Logging ................................................................................................176 Java and ActiveX Security ...........................................................................176 Securing XML Web Services (SOAP) ...............................................................177 Understanding HTTP Sessions, Connections and URLs ..................................177 HTTP Request Example ..............................................................................177 HTTP Response Example ...........................................................................178 HTTP Connections ......................................................................................178 Understanding URLs....................................................................................179 Connectivity or Security: Web Surfers ..............................................................179 Allowing or Restricting Content ....................................................................179 Content Compression ..................................................................................180 HTTP Security Server Performance .................................................................180 Simultaneous Security Server Connections .................................................180 Running Multiple Instances of HTTP Security Server ...................................181 The Check Point IPv6 Solution .......................................................................... 182 Dual Stack for IPv4 and IPv6 ............................................................................182 Accessing the IPv6 Kernel ................................................................................182 Supported Platforms .........................................................................................183 Supported Features ..........................................................................................183 IPv6 Licensing ..................................................................................................184 Installation and Configuration ...........................................................................184 Enabling IPv6 on the Gateway .....................................................................185 Disabling IPv6 on IPv6 enabled modules .....................................................186 Disabling IPv6 functionality ..........................................................................186 Working with IPv6 in SmartConsole ..................................................................186 Creating an IPv6 object................................................................................186 Partial Address Based Filtering ....................................................................187 IPv6 Rules ...................................................................................................187 IPv6 in SmartView Tracker ..........................................................................188 IPv6 Services ...............................................................................................188 Appendix A: Security Before Firewall Activation ............................................. 190 Achieving Security Before firewall Activation ....................................................190 Boot Security ....................................................................................................190 Control of IP Forwarding on Boot .................................................................190 The Default Filter ..............................................................................................191 Changing the Default Filter to a Drop Filter ..................................................191 Defining a Custom Default Filter ..................................................................192 Using the Default Filter for Maintenance ......................................................192 The Initial Policy ...............................................................................................192 Managing Default Filter and Initial Policy ..........................................................193 Verifying Default Filter or Initial Policy Loading ............................................193 Unloading Default Filter or Initial Policy ........................................................194
Troubleshooting: Cannot Complete Reboot .................................................194 Command Line Reference ...........................................................................194 Appendix B: Legacy URL Filtering .................................................................... 197 Using URL Filtering to Limit Web Surfers .........................................................197 Understanding URL Filtering ........................................................................197 URL Filtering Using the HTTP Security Server.............................................198 Enhanced UFP Performance Mode .............................................................199 Choosing the URL Filtering Mode ................................................................199 Configuring URL Filtering with a UFP Server ....................................................200 Rule Match in UFP Modes ...........................................................................200 Configuring URL Filtering .............................................................................201 Basic URL Filtering ...........................................................................................201 Configuring Basic URL Filtering ...................................................................202 Index .................................................................................................................... 203
Chapter 1
Access Control
In This Chapter Check Point Access Control Solution Rules and the Rule Base Preventing IP Spoofing Multicast Access Control Cooperative Enforcement End Point Quarantine (EPQ) - Intel AMT 10 11 15 18 20 22
A security administrator is responsible for implementing company security policy. The Security Management Server enables administrators to enforce security policies consistently across multiple gateways. To do this, the administrator defines a company-wide security policy Rule Base using SmartDashboard and installs it to the Security Management Server. SmartDashboard is a SmartConsole client application that administrators use to define and apply security policies to gateways. Granular security policy control is possible by applying specific rules to specific gateways. A Security Gateway provides secure access control because of its granular understanding of all underlying services and applications traveling on the network. Stateful Inspection technology provides full application level awareness and comprehensive access control for more than 150 predefined applications, services and protocols as well as the ability to specify and define custom services.
Page 10
Service
Action
Track
Install-On
Time
Access Control
Page 11
Implied Rules
Apart from rules explicitly defined by an administrator, the Security Gateway also creates implied rules, which are derived from Global Properties definitions. Implied rules enable certain connections to occur to and from the gateway using a variety of different services. The firewall places implied rules either first, last, or immediately before last rule in the Rule Base. Examples of implied rules include rules that enable Security Gateway control connections and outgoing packets originating from the Security Gateway.
Access Control
Page 12
Simplicity
The key to effective firewall protection is a simple Rule Base. One of the greatest dangers to the security of your organization is misconfiguration. For example, a user may try to sneak spoofed, fragmented packets past your firewall if you have accidentally allowed unrestricted messaging protocols. To keep your Rule Base simple, ensure that it is concise and therefore easy to understand and maintain. The more rules you have, the more likely you are to make a mistake.
Basic Rules
When creating rules, ensure that you allow only traffic that you want. Consider traffic initiated and crossing the firewall from both the protected and unprotected sides of the firewall. The following basic access control rules are recommended for every Rule Base: A Stealth Rule to prevent direct access to the Security Gateway. A Cleanup Rule to drop all traffic that is not permitted by the previous rules. There is an implied rule that does this, but the Cleanup Rule allows you to log such access attempts.
Remember that the fundamental concept behind the Rule Base is that actions that are not explicitly permitted are prohibited.
Rule Order
Rule order is a critical aspect of an effective Rule Base. Having the same rules, but putting them in a different order, can radically alter the effectiveness of your firewall. It is best to place more specific rules first and more general rules last. This order prevents a general rule from being applied before a more specific rule and protects your firewall from misconfigurations.
X11 Service
The X11 (X Window System Version 11) graphics display system is the standard graphics system for the Unix environment. To enable X11, you must create a specific rule using the X11 service. If you select Any as the Source or Destination, the X11 service is not included because when using the X11 service, the GUI application acts as the server rather than the client.
Access Control
Page 13
Accept SmartUpdate connections Accept outbound packets originating from the gateway Accept RIP Accept Domain Name Over UDP (Queries) Accept Domain Name over TCP (Zone transfer) Accept ICMP requests Accept dynamic address DHCP traffic Accept VRRP packets originating from cluster members (VSX Nokia VRRP)
Access Control
Page 14
Preventing IP Spoofing
The policy also requires two basic rules: a Stealth rule and a Cleanup rule. Figure 1-3
Typical Network with Access Control Policy
Preventing IP Spoofing
If your network is not protected against IP address spoofing, your access control rules are ineffective and it is easy for attackers to gain access by changing the source address of the packet. For this reason, ensure that you configure anti-spoofing protection on every interface of the Security Gateway, including internal interfaces. IP spoofing occurs when an intruder attempts to gain unauthorized access by changing a packet's IP address to appear as though it originated from network node with higher access privileges. Note - It is important to ensure that all communication originates from its apparent source. Anti-spoofing protection verifies that packets originate from and are destined to the correct interfaces on the gateway. It confirms which packets actually come from the specified internal network interface. It also verifies that once a packet is routed, it goes through the proper interface.
Access Control
Page 15
Preventing IP Spoofing
A packet coming from an external interface, even if it has a spoofed internal IP address, is blocked because the firewall anti-spoofing feature detects that the packet arrived from the wrong interface. Figure 1-4
Anti-Spoofing Process
On Alaska_GW, the firewall ensures that: All incoming packets to interface IF1 come from the Internet. All incoming packets to interface IF2 come from Alaska_LAN or, Alaska_RND_LAN or Florida_LAN.
On Alaska_RND_GW, the firewall ensures that: All incoming packets to interface IF3 come from Alaska_LAN, Florida_LAN or the Internet. All incoming packets to interface IF4 come from Alaka_RND_LAN.
When configuring anti-spoofing, you need to specify in the interface topology definitions whether the interfaces lead to the Internet (defined as External) or an internal network (defined as Internal).
Configuring Anti-Spoofing
It is important to configure anti-spoofing protection on every interface of every Security Gateway, including internal interfaces.
6. 7. 8. 9. 10.
Access Control
Page 16
Preventing IP Spoofing
Detect - to allow packets that have possibly been spoofed. This option is used for monitoring purposes and should be used in conjunction with one of the tracking options. It serves as a tool for learning the topology of a network without actually rejecting packets. 11. Don't check packets from is used to ensure anti-spoof checks do not take place for addresses from certain internal networks coming into the external interface. To use this option, select the checkbox and select from the drop-down list a network object that represents those internal networks with valid addresses. If the network object that you need is not in the list, click New and define the Internal Network object that you need. Objects selected in the drop-down list are disregarded by the anti-spoofing enforcement mechanism. 12. In the Spoof Tracking option, select Log and then click OK.
If there is more than one network behind the interface, define a group network object that consists of all the networks behind the interface by selecting Specific and the group. 8. Select Perform Anti-Spoofing based on interface topology. 9. Under Anti-Spoofing action is set to, select one of the following: Prevent - to block packets that have been spoofed. Detect - to allow packets that have possibly been spoofed. This option is used for monitoring purposes and should be used in conjunction with one of the tracking options. It serves as a tool for learning the topology of a network without actually rejecting packets. 10. Under Spoof Tracking, select Log and click OK. 11. Repeat step 1 to step 8 for all internal interfaces. 12. Install the security policy: Policy > Install.
Legal Addresses
Legal addresses are those addresses that are permitted to enter a Security Gateway interface. Legal addresses are determined by the network topology. When configuring the firewall anti-spoofing protection, the administrator specifies the legal IP addresses behind the interface. The Get Interfaces with Topology option automatically defines the interface and its topology and creates network objects. the firewall obtains this information by reading routing table entries.
Access Control
Page 17
Just as a radio is tuned to receive a program that is transmitted at a certain frequency, a host interface can be tuned to receive datagrams sent to a specific multicast group. This process is called joining a multicast group. The remaining 28 bits of the multi-case address range identify the multicast group to which the datagram is sent. Membership in a multicast group is dynamic (hosts can join and leave multicast groups). The source address for multicast datagrams is always the unicast source address.
Access Control
Page 18
These addresses are called permanent host groups. The following table shows examples of reserved Local Network Multicast Groups. Table 1-3 Local Network Multicast Groups Examples Multicast Address 224.0.0.1 Purpose All hosts. An ICMP Request (ping) sent to this group should be answered by all multicast capable hosts on the network. Every multicast capable host must join this group at start up on all of its multicast capable interfaces. All routers. All multicast routers must join this group on all of its multicast capable interfaces. All DVMRP routers. All OSPF routers. All PIM routers.
224.0.0.2
For additional information on reserved multicast addresses, refer to the IANA website (http://www.iana.org/assignments/multicast-addresses).
When access restrictions for multicast datagrams are not defined, inbound multicast datagrams entering a gateway from one interface are allowed out of all other interfaces. In addition to defining per interface access restrictions, you must define a rule in the Rule Base that allows multicast traffic and services, and the destination defined in this rule must allow the required multicast groups.
Access Control
Page 19
Cooperative Enforcement
VPN Connections
Multicast traffic can be encrypted and sent across VPN links defined using multiple VPN tunnel interfaces (virtual interfaces associated with the same physical interface).
Cooperative Enforcement
Cooperative Enforcement works with Check Point Endpoint Security servers. This feature utilizes the Endpoint Security server compliance capability to verify connections arriving from various hosts across the internal network. Endpoint Security server is a centrally managed, multi-layered Endpoint Security solution that employs policy-based security enforcement for internal and remote PCs. Easily deployed and managed, the Endpoint Security server mitigates the risk of hackers, worms, spyware, and other security threats. Features such as predefined policy templates, an intuitive Web-based management interface, and PC firewall and application privilege controls, enable administrators to develop, manage, and enforce Cooperative Enforcement quickly and easily. Using Cooperative Enforcement, any host initiating a connection through a gateway is tested for compliance. This increases the integrity of the network because it prevents hosts with malicious software components from accessing the network. This feature acts as a middle-man between hosts managed by an Endpoint Security server and the Endpoint Security server itself. It relies on the Endpoint Security server compliance feature, which defines whether a host is secure and can block connections that do not meet the defined prerequisites of software components. The following is a typical Cooperative Enforcement workflow: 1. A host opens a connection to the network through a firewall gateway. The first packet from the client to the server is allowed. It is only on the first server's reply to the client that the Cooperative Enforcement feature begins to perform. 2. The firewall checks for host compliance in its tables and queries the Endpoint Security server, if required.
Access Control Page 20
Cooperative Enforcement
3. Upon receiving a reply, connections from compliant hosts are allowed and connections from noncompliant hosts are blocked. When activating the cooperative enforcement feature on a gateway, the following implied rules are automatically enabled: 1. Allow all firewall GUI clients to connect to the Endpoint Security server via HTTP or HTTPS (port 80 or 443). 2. Allow all internal clients to access the Endpoint Security server via the firewall for heartbeats. 3. Allow the firewall to communicate with the Endpoint Security server on port 5054. If additional access permissions are required (such as allow external clients to connect to the Endpoint Security server, or for other machines to access the administration portion of the Endpoint Security server), explicit rules should be defined.
Enforcement Mode
When in Enforcement Mode, non-compliant host connections are blocked by the firewall endpoint security feature. For HTTP connections, the host is notified that it is non-compliant. The user can then perform appropriate actions to achieve compliance. For example, the user may upgrade the version of the Endpoint Security client.
NAT Environments
Cooperative Enforcement feature is not supported by all the NAT configurations. For Cooperative Enforcement to work in a NAT environment, the gateway and the Endpoint Security Server must relate to the same IP address of a specific client. Therefore, when NAT is used, if NAT is causing the Client IP received by gateway to be different than the Client IP received by the Endpoint Security Server, Cooperative Enforcement will not work properly.
Access Control
Page 21
Activating EPQ
EPQ is disabled by default.
To enable EPQ:
1. On the enable_amt line, change false to true. 2. Install policy. The following is an example of an AMT.conf file. ----- Activate the feature by changing the flag to true and define the subnets the feature is enabled on. :enable_amt (false) ----- AMT Quarantine can be activated on a host, on a network, or both :apply_on ( :(host :ipaddr (192.168.10.1) ) :(network :ipaddr_from (192.168.10.1) :ipaddr_to (192.168.10.100) ) ) :track (log)
Access Control
Page 22
:authentication ( ----- Define the authentication method using on of the following: no_tls - clear text tls - only server authentication mutual_tls - client and server authentication :method (no_tls) ----- User name and password are required for all methods :user_name ("admin") :user_pass ("Myadmin1!") ----- Server Certificate is only required when tls is the chosen authentication method :server_certificate ( :server_cert_name ("server certificate name") :server_cert_path ("server certificate path") ) ----- Client certificate is only relevant on Linux when mutual_tls is the chosen authentication method :client_certificate ( :cert_name ("certificate name") :cert_pass ("certificate pass") ) )
Access Control
Page 23
:quarantine_policy_data ( :policy_name ("CP_Qua") ----- Format for policy version is MMDDHHmm (month/day/hour/minutes) :policy_ver ("23121917") -- Define rules for traffic directed to machine initiating malicious activity :incoming ( :1 ( :name ("dns") :service ( :protocol (udp) # tcp / udp :port (53) ) :address ("10.16.70.5") :address_mask ("255.255.255.0") ) :2 ( :name ("ftp") :service ( :protocol (udp) :port (21) ) :address ("10.16.70.5") :address_mask ("255.255.255.0") ) -- Define rules for traffic from machine initiating malicious activity :outgoing ( :1 ( :name ("dns") :service ( :protocol (udp) # tcp / udp :port (53) ) :address ("10.16.70.5") :address_mask ("255.255.255.0") ) :2 ( :name ("ftp") :service ( :protocol (udp) :port (21) ) :address ("10.16.70.5") :address_mask ("255.255.255.0") ) You can configure up to 29 rules for incoming traffic and up to 29 rules outgoing traffic. The policy name must begin with "CP_" and cannot exceed six letters. Numbers and other characters are not permitted. Note - It is recommended not to change the default policy name
Access Control
Page 24
sam_alert Usage
sam_alert [-O] [-S] [-t timeout] [-f target] [-n name] -[c comment] [-o originator] [-l r|a] -a d|r|n|b|q|i [-C] -ip -eth -src -dst -srv -any The following table describes the arguments for this command. Argument -O -S -t timeout Description print the input of this tool to Standard output (for pipes). Match the SAM server to be contacted. Default is localhost. The time period (in seconds) for which the action will be enforced. The default is forever. The firewalls on which to run the operation. Default is All. Fill in the SAM name field. Default is empty. Fill in the SAM comment field. Default is empty. Fill in the SAM originator field. Default is "sam_alert". Logs to issue for connections matching the specified criteria. Either r/egular, a/lert. Default is None. Action to apply on connections matching specified criteria. Either d/rop, r/eject, n/otify, b/ypass, q/uarantine, i/nspect. Close all existing connections that match the criteria. Use IP addresses as criteria parameters. Use MAC addresses as criteria parameters. Match the source address of connections. Match the destination address of connections. Match specific source, destination, protocol and service. Match either the source or destination address of connections.
-a
-ip and -src represent that we only want to block an attacker that sends something malicious. 3. Install policy.
Access Control
Page 25
Logging Activity
The script is run when a malicious action is logged. Note - Actions are not logged by default. The User Defined alert must be enabled for each threat for the sam_alert script to be activated. The log as it appears in SmartView Tracker
The first log entry represents that the end point host, Broadwater, has been quarantined The second log represents that the end point host, broadwater, has been released from quarantine and authorized to be part of the network. To quarantine a machine manually, execute the following command: epq -o < status | list | is_amt | enable | disable [-l lastPolicyHandle] > -i AMTdeviceIP [policyFileName] Table 1-4 Arguments for epq Argument status list is_amt enable disable -l lastPolicyHandle -i AMTdeviceIP Description Display the status of the policies and rules. List the quarantined end-point computers. Allows the user to check if there is AMT on the machine. Activates the policy. Deactivates the policy being enforced. This is the last known policy to be activated. The IP address of the end-point computer you want to quarantine. The file name of the file containing the policy you want to enforce. (default location is $FWDIR/conf/AMT.conf)
policyFileName
Access Control
Page 26
Chapter 2
Authentication
This section presents background information and procedures for working with user authentication. Authentication confirms the identity of valid users authorized to access your company network. Staff from different departments are assigned access permissions based on their level of responsibility and role within the organization. Authentication ensures that all users trying to access the system are valid users, but does not define their access rights.
In This Chapter Configuring Authentication Authentication Schemes Authentication Methods Creating Users and Groups Configuring Authentication Tracking Configuring Policy for Groups of Windows Users 27 28 32 40 41 41
Configuring Authentication
On the Security Gateway, you can configure authentication in one of two places: In the Gateway Properties window of a gateway in Authentication. In the Authentication page, you can allow access to users who authenticate with a Check Point Password, SecurID, OS Password, RADIUS server, or TACACS server. Authentication using Client Certificates from the Internal Certificate Authority is enabled by default in addition to the selected method. Some blades have their own authentication settings. Configure this in the Gateway Properties window of a gateway under <name of the blade> > Authentication. For example, configure the authentication method for IPSec VPN clients in Gateway Properties > IPSec VPN > Authentication. If you select an authentication method for the blade, that is the method that all users must use to authenticate to that blade. You can configure other authentication methods that users must use for different blades on different pages. If you do not make a selection on the Authentication page for a specific blade, the Security Gateway takes authentication settings for the blade from the main gateway Authentication page. Note - In previous releases there was no option to configure an authentication setting for a specific blade. But from R75 and higher, if you configure an authentication method for a specific blade, the settings on this page do not apply at all to that blade.
Page 27
Authentication Schemes
2. If the specified user is not defined in this database, the gateway queries the SmartDirectory (LDAP) servers defined in the Account Unit one at a time, and according to their priority. 3. If the information still cannot be found, the gateway uses the external users template to see if there is a match against the generic profile. This generic profile has the default attributes applied to the specified user. If you configure an authentication method for a specific blade, the gateway searches for users according to the user groups that are used for authorization in that blade. For example, in Mobile Access, the gateway looks at the Mobile Access policy to see which user groups are part of the policy. When the gateway tries to authenticate a user, it starts to search for users in the databases related to those user groups. In IPSec VPN, the gateway looks at the Remote Access VPN Community to see which user groups are included. It starts to search for users in the databases related to those user groups. A search based on the authentication scheme is faster, with better results. You can have users with the same username in unrelated groups. The gateway will know which user is relevant for the blade based on the user groups.
Authentication Schemes
Security Gateways authenticate individual users using credentials and manages them using different authentication schemes. All of the authentication schemes require the provision of a user name and password. While some schemes involve storing the passwords on the gateway, others are stored on external servers. The following sections describe the various authentication schemes supported by Check Point.
RADIUS
Remote Authentication Dial-In User Service (RADIUS) is an external authentication scheme that provides security and scalability by separating the authentication function from the access server. Using RADIUS, the Security Gateway forwards authentication requests by remote users to the RADIUS server. The RADIUS server, which stores user account information, authenticates the users. The RADIUS protocol uses UDP to communicate with the gateway. RADIUS servers and RADIUS server group objects are defined in SmartDashboard.
Authentication
Page 28
Authentication Schemes
b) Associate the RADIUS Server object with the RADIUS Host object created in step 1. c) Assign the Service by selecting either the RADIUS on port 1645 or NEW-RADIUS on port 1812 service. (The default setting is RADIUS, however the RADIUS standards group recommends using NEW-RADIUS, because port 1645 can conflict with the datametrics service running on the same port.) d) Assign the same Shared Secret that you configured on the actual RADIUS server. e) Select either RADIUS Ver. 1.0 Compatible, which is RFC 2138 compliant, or RADIUS Ver. 2.0 Compatible, which is RFC 2865 compliant. f) Assign the RADIUS server's Priority if you are employing more than one RADIUS Authentication server.
g) Click OK. 4. Right-click the gateway object and select Edit >Authentication. 5. Enable RADIUS authentication. 6. Define a user group by selecting Manage > Users & Administrators > New > User Group (for example, RADIUS_Users). 7. Enable RADIUS authentication for Security Gateway users by selecting Manage > Users and Administrators > New > User by Template > Default. 8. Enable RADIUS authentication for users without Security Gateway user accounts by creating an External User Profile. Select Manage > Users and Administrators > New > External User Profile > Match all users or Match by domain. To support more than one external authentication scheme, define your External User Profiles with the Match By Domain setting. 9. For all User Profiles and Templates, configure the following: a) In the General tab, type the default login name for the RADIUS server. (When configuring Match all users as an External User Profile, the name "generic*" is automatically assigned.) b) In the Personal tab, adjust the Expiration Date. c) In the Authentication tab, select RADIUS from the drop-down list. d) In the Groups tab, add the User Profile to the RADIUS group. 10. Verify that communication between the firewall and the RADIUS server are not defined in the Address Translation Rule Base. 11. Save, verify, and install the policy.
Authentication Schemes
8. On the Security Management server, use the Graphical Database Tool (GUIdbEdit) to change the value of the add_radius_groups attribute from false to true. 9. Run cpstart on the Security Management server. 10. Install the policy. 11. On the RADIUS server, modify the RADIUS users to include a class RADIUS attribute on the users Return list that corresponds to the user group that they access.
To use a different attribute instead of the class attribute, do one of the following:
1. On the Security Gateway, use GUIdbEdit to modify the value of the firewall_properties attribute radius_groups_attr to the new RADIUS attribute. 2. On the RADIUS server, ensure that you use the same RADIUS attribute (on the users' Return list that corresponds to the Firewall user group that they access).
SecurID
SecurID requires users to both possess a token authenticator and to supply a PIN or password. Token authenticators generate one-time passwords that are synchronized to an RSA ACE/server and may come in the form of hardware or software. Hardware tokens are key-ring or credit card-sized devices, while software tokens reside on the PC or device from which the user wants to authenticate. All tokens generate a random, one-time use access code that changes approximately every minute. When a user attempts to authenticate to a protected resource, the one-time use code must be validated by the ACE/server. Using SecurID, the Security Gateway forwards authentication requests by remote users to the ACE/server. ACE manages the database of RSA users and their assigned hard or soft tokens. The gateway acts as an ACE/Agent 5.0 and directs all access requests to the RSA ACE/server for authentication. For additional information on agent configuration, refer to ACE/server documentation. There are no specific parameters required for the SecurID authentication scheme.
Authentication
Page 30
Authentication Schemes
6. Enable SecurID authentication for users without Security Gateway user accounts by creating an External User Profile. Select Manage > Users and Administrators > New > External User Profile > Match all users or Match by domain. If you support more than one external authentication scheme, set up your External User Profiles with the Match By Domain setting. 7. For all User Profiles and Templates, configure the following: a) In the General tab, enter the default login name for the ACE/Server. (When configuring Match all users as an External User Profile, the name "generic*" is automatically assigned). b) In the Personal tab, change the Expiration Date. c) In the Authentication tab, select SecurID from the drop-down list. d) In the Groups tab, add the User Profile to the SecurID group. 8. Verify that communication between the firewall and the ACE/Server are not NATed in the Address Translation Rule Base. 9. Save, verify, and install the policy. Note - When a Security Gateway has multiple interfaces, the SecurID agent on the Security Gateway sometimes uses the wrong interface IP to decrypt the reply from the ACE/Server, and authentication fails. To overcome this problem, place a new text file, named sdopts.rec, in the same directory as sdconf.rec. The file should contain the CLIENT_IP=<ip> line, where <ip> is the primary IP address of the Security Gateway, as defined on the ACE/Server. This is the IP address of the interface to which the server is routed.
TACACS
Terminal Access Controller Access Control System (TACACS) provides access control for routers, network access servers and other networked devices through one or more centralized servers. TACACS is an external authentication scheme that provides verification services. Using TACACS, the Security Gateway forwards authentication requests by remote users to the TACACS server. The TACACS server, which stores user account information, authenticates users. The system supports physical card key devices or token cards and Kerberos secret key authentication. TACACS encrypts the user name, password, authentication services and accounting information of all authentication requests to ensure secure communication.
Authentication
Page 31
Authentication Methods
8. Enable TACACS authentication for users without Security Gateway user accounts by creating an External User Profile. Select either Manage > Users and Administrators > New > External User Profile > Match all users or Match by domain. If more than one external authentication scheme is supported, set up your External User Profiles using the Match By Domain setting. 9. For all User Profiles and Templates, configure the following: a) In the General tab, enter the default login name for the TACACS Server. (When configuring Match all users as an External User Profile, the name "generic*" is automatically assigned). b) In the Personal tab, change the Expiration Date. c) In the Authentication tab, select TACACS from the drop-down list. d) In the Groups tab, add the User Profile to the TACACS group. 10. Verify that communication between the firewall and the TACACS server is not NATed in the Address Translation Rule Base. 11. Save, verify, and install the policy.
Undefined
The authentication scheme for a user can be defined as undefined. If a user with an undefined authentication scheme is matched to a Security Rule with some form of authentication, access is always denied.
Authentication Methods
Instead of creating a security rule that simply allows or denies connections, the firewall administrator can request that clients authenticate when they try to access specific network resources. There are three authentication methods available: user, client and session. These methods differ in the services provided, the logon mechanism, and the overall user experience. Each method can be configured to connect and authenticate clients to the gateway before the connection is passed to the desired resource (a process known as nontransparent authentication). Alternatively, each method can be configured to connect clients directly to the target server (a process known as transparent authentication).
User Authentication
User Authentication provides authentication for Telnet, FTP, HTTP, and rlogin services. By default, User Authentication is transparent. The user does not connect directly to the gateway, but initiates a connection to the target server. The following is a typical User Authentication method workflow: 1. The Security Gateway intercepts the communication between the client and server. 2. The Security Gateway prompts the user for a user name and password. 3. If the user successfully authenticates, the gateway passes the connection to the remote host. If incorrect credentials are presented, the user is prompted to re-enter the data. After a predefined number of unsuccessful connection attempts, the connection is dropped. 4. The remote host prompts the user for a user name and password. Note - When configuring user objects, you can set the locations that they are allowed to access, however, this can lead to a conflict with security rules that require some form of authentication. See also: Resolving Access Conflicts (on page 38)
Authentication
Page 32
Authentication Methods
Session Authentication
Session Authentication can be used for any service, however, a Session Authentication agent is required to retrieve a user's identity. The Session Authentication agent is normally installed on the authenticating client, whereby the person who initiates the connection to the destination host, supplies the authentication credentials. Session authentication requires an authentication procedure for each connection, however, the Session Authentication agent can also be installed on the destination machine, or on some other machine in the network, thereby allowing the user at that machine to provide the user name and password. The following is a typical Session Authentication workflow: 1. The user initiates a connection directly to the server. 2. The Security Gateway intercepts the connection. 3. The Session Authentication agent challenges the user for authentication data and returns this information to the gateway. 4. If the authentication is successful, the Security Gateway allows the connection to pass through the gateway and continue to the target server. Note - When configuring user objects, you can set the locations that they are allowed to access. This can lead to conflicts with security rules that require a form of authentication. See also Resolving Access Conflicts (on page 38)
Authentication
Page 33
Authentication Methods
authentication schemes. For example, if some users must provide a Check Point password, and others RADIUS authentication, select both schemes. 4. Define a Session Authentication access rule by doing the following: a) Right-click in the Source column, select Add object > Add legacy user access and then the group. Do not close the window. b) To restrict the location of authenticating users, in the Location section of the same window, select Restrict To and the host, group of hosts, network or group of networks that users can access. c) In the Service field, select the services you want to authenticate. d) In the Action column, select Legacy > Session Auth. 5. Double-click the Action column to edit the User Authentication Action Properties. 6. If required, adjust the Failed Authentication Attempts settings for Session Authentication in the Authentication page of the Global Properties. 7. Install the security policy.
If Session Authentication agent is installed on the destination machine or on some other machine in the network, the user at the machine on which the Agent is installed is prompted to provide authentication credentials. 2. On Windows machines, double-click the Session Authentication agent icon in the system tray. The Session Authentication window. 3. Click Configure. The Configuration window opens and displays the Passwords tab. Specify how often the user is prompted to provide their password. One-time passwords (such as SecurID) cannot be cached. 4. Select one of the following options: Every request: The user is prompted for a password each time that the Security Gateway requests authentication. Each time that the user initiates a session for which a Session Authentication Rule applies, the user is prompted for the password. No password caching occurs. Once per session: The user is prompted for the password once per Session Authentication Agent session. Once the user provides the password, the Session Authentication agent caches the password indefinitely. This option cannot be used with one-time passwords. If the Session Authentication Agent session is closed and then restarted, the user must provide the password again.
After minutes of inactivity: Similar to the Once per session option, however, the user is prompted again for the password if there has been no authentication request over a specified time interval. 5. In the Configuration window, select the Allowed FireWall-1 tab and specify the Security Gateways for which the Session Authentication agent can provide authentication services. 6. Select one of the following options: Any IP Address: The Session Authentication agent can provide authentication services for any Security Gateway.
IP Address: The Session Authentication agent can provide authentication services for only a Security Gateway running on a user-specified IP address (you can specify up to three IP addresses). 7. In the Configuration window, select the Options tab and specify whether to allow clear passwords and to resolve addresses. 8. Select the appropriate option and click OK.
Authentication Methods
2. Configure the Session Authentication Agent and/or receive authentication requests from a Security Gateway.
Client Authentication
Client Authentication can authenticate any service. It enables access from a specific IP address for an unlimited number of connections. The client user performs the authentication process, but it is the client machine that is granted access. Client Authentication is less secure than user authentication because it permits access for multiple users and connections from authorized IP addresses or hosts. Authorization is performed on a per machine basis for services that do not have an initial login procedure. The advantages of Client Authentication are that it can be used for an unlimited number of connections, for any service, and is valid for any length of time. Note - When configuring user objects, you can set the locations that users can access, however, this can cause problems with security rules that require some form of authentication. See also Resolving Access Conflicts (on page 38) Client Authentication works with all sign on methods. The following table shows how different sign on methods provide choice when selecting an authentication method for authenticated and other services. For sign on methods other than Manual Client Authentication, the gateway is transparent to the users and they authenticate directly to the destination host. Table 2-5 Client Authentication Sign On Methods Client Authentication Sign On Method Manual Authentication Method for Authentication Method authenticated services: Telnet, for other services FTP, HTTP, RLOGIN Telnet to port 259 on gateway HTTP to port 900 on gateway Telnet to port 259 on gateway HTTP to port 900 on gateway Not available Session Authentication Session Authentication UserAuthority
The following are the two Client Authentication sign on options: Standard Sign on: Enables users to access all services permitted by the rule without authenticating for each service. Specific Sign on: Enables users to access only the services that they specify when they authenticate, even if the rule allows more than one service. If the user wants to use another service, they must reauthenticate for that specific service.
At the end of an authentication session, the user can sign off. When a user signs off, they are disconnected from all services and the remote host.
Manual Sign On
Manual Sign On is available for any service that is specified in the Client Authentication rule. The user must first connect to the gateway and authenticate in one of the following two ways: 1. Through a Telnet session to the gateway on port 259. 2. Through an HTTP connection to the gateway on port 900 and a Web browser. The requested URL must include the gateway name and the port number, for example, http://Gateway:900. a) The following example shows Client Authentication using a Standard Manual Sign On method. In this example, before opening a connection to the destination host, the user fbloggs first authenticates to london, the Security Gateway.
Authentication Page 35
Authentication Methods
tower 1% telnet london 259 Trying 191.23.45.67 ... Connected to london. Escape character is '^]'. CheckPoint FireWall-1 Client Authentication Server running on london Login: fbloggs FireWall-1 Password: ******** User authenticated by FireWall-1 auth. Choose: (1) Standard Sign On (2) Sign Off (3) Specific Sign On Enter your choice: 1 User authorized for standard services (1 rules) Connection closed by foreign host. b) The following example shows Client Authentication using a Specific Manual Sign On method. In this example, two services are specified: rstat and finger (each one to a different host). tower 3% telnet london 259 Trying 191.23.45.67 ... Connected to london. Escape character is '^]'. CheckPoint FireWall-1 Client Authentication Server running on london Login: jim FireWall-1 Password: ******** User authenticated by Internal auth. Choose: (1) Standard Sign On (2) Sign Off (3) Specific Sign On Enter your choice: 3 Service: rstat Host: palace Client Authorized for service Another one (Y/N): Y Service: finger Host: thames Client Authorized for service Another one (Y/N): n Connection closed by foreign host.
Wait Mode
Wait mode is a Client Authentication feature for Manual Sign On when the user initiates a client authenticated connection with a Telnet session on port 259 on the gateway. Wait mode eliminates the need to open a new Telnet session in order to sign off and withdraw client authentication privileges. In Wait mode, the initial Telnet session connection remains open so long as client authentication privileges remain valid. Client authentication privileges are withdrawn when the Telnet session is closed. The Security Gateway keeps the Telnet session open by pinging the authenticating client. If for some reason the client machine stops running, the gateway closes the Telnet session and client authentication privileges from the connected IP address are withdrawn. Enable Wait mode works only with client authentication rules that specify Standard Sign On. In Enable Wait mode, client authentication rules that require Specific Sign On are not applied.
Authentication
Page 36
Authentication Methods
Single Sign On
Single Sign On is available for any service only if the required service is specified in the Client Authentication rule and UserAuthority is installed. Single Sign On is a Check Point address management feature that provides transparent network access. The Security Gateway consults the user IP address records to determine which users are logged on to any given IP address. When a connection matches a Single Sign On enabled rule, the gateway queries UserAuthority with the packet's source IP. UserAuthority returns the name of the user who is registered to the IP. If the user's name is authenticated, the packet is accepted, if not, it is dropped.
Authentication
Page 37
Authentication Methods
7. If required, adjust the Failed Authentication Attempts settings for Client Authentication in the Authentication page of the Global Properties window. 8. Install the security policy.
Authentication
Page 38
Authentication Methods
Changing the Client Authentication Port Number To change the Client Authentication port number:
1. Stop Check Point services by running the cpstop command. 2. Modify the port number in the Manage > Service > Show > TCP Services window for the following services: To modify the port number for Telnet sign on, change the port number of the FW1_clntauth_telnet service.
To modify the port number for HTTP sign on, change the port number of the FW1_clntauth_http service. These are special Check Point services provided as part of the Client Authentication feature. 3. Use a simple text editor to edit the $FWDIR/conf/fwauthd.conf file. Change the port number of the Client Authentication application to the same port number defined in step 2. 4. Do one of the following: For Telnet Sign On, modify the first column in the in.aclientd line. For HTTP Sign On, modify the first column in the in.ahclientd line.
21 fwssd in.aftpd wait 0 80 fwssd in.ahttpd wait 0 513 fwssd in.arlogindwait 0 25 fwssd in.asmtpd wait 0 23 fwssd in.atelnetd wait 0 259 fwssd in.aclientd wait 259 10081 fwssd in.lhttpd wait 0 900 fwssd in.ahclientdwait 900 0 fwssd in.pingd respawn 0 0 fwssd in.asessiond respawn 0 0 fwssd in.aufpd respawn 0 0 vpn vpnd respawn 0 0 fwssd mdq respawn 0 0 xrm xrmdrespawn0-pr
5. Ensure that there is no rule that blocks the connection to the new port. 6. Restart Check Point services by running the cpstart command. For additional information on configuring Client Authentication, see Configuring Client Authentication (on page 37).
Allowing Encrypted Client Authentication To configure Encrypted Client Authentication for HTTPS Connections:
1. On the Security Gateway, execute cpstop on the Security Gateway. 2. Edit fwauthd.conf, located in the $FWDIR/conf directory. Add :defaultCert to the following line: 900 fwssd in.ahclientd wait 900 ssl:defaultCert
Note - defaultCert is a nickname included in the Certificate List on a Security Gateway. To check the nickname of your gateway, open the VPN page of the Gateway Properties window and see the Certificates List. 1. 2. 3. 4. Save and close the file. Run cpstart. Open SmartDashboard. Create a rule following rule
Authentication Page 39
Service https
Note - This Rule also permits HTTPS traffic between the client and the Web server following successful authentication. 5. Install the policy.
After you create a template, any user that you create based on a given template inherits that template's properties, including membership in groups. If you modify a template's properties, those changes will only affect future users created using that template. Users previously created using that template are not affected.
Authentication
Page 40
Creating Users
To create users:
1. In the Users branch of the objects tree, right-click and select Edit. The User Properties window opens. 2. Enter the user data. You can change the properties that the user inherited from the template for that user only without changing the template.
Authentication
Page 41
Chapter 3
Network Address Translation
Network Address Translation (NAT) involves replacing one IP address with another. NAT can change both the source and destination address inside the packet. This means that a packet that is sent from the internal (protected) side to the external (unprotected) side of the firewall appears to the destination as if it came from a different address, and the packet that is sent from the external to the internal side of the firewall arrives at the correct address. NAT works with all Check Point network objects, nodes, networks, address ranges, and dynamic objects. You can define NAT automatically by means of the network object configuration, which automatically adds rules to the NAT Rule Base. You can also manually define rules in the NAT Rule Base. Manually creating NAT Rules adds extra flexibility. For example, in addition to translating IP addresses, you can translate the service or the destination port numbers. Port number translation is a type of Static NAT, in which one port number is translated to another port number. In This Chapter NAT Modes NAT Rule Base Planning Considerations for NAT Configuring NAT Advanced NAT Configuration 42 45 47 49 52
NAT Modes
The Security Gateway supports two types of NAT: Static NAT: Each individual private address is translated to a corresponding public address. Connections can originate from both sides of a Security Gateway, so that internal servers are accessible from external sources. Hide NAT: Maps all specified internal addresses to a single public IP address, thus hiding the internal IP structure from external sources. Connections can originate only from the internal, protected side of a Security Gateway. Internal resources are not accessible by external sources.
Page 42
NAT Modes
Static NAT
The following example illustrates a typical static NAT deployment. Static NAT on a node translates its private address to a unique public address. Static NAT on a network or address range translates each IP address in the network or range to a corresponding public IP address, starting from the defined Static IP address. Figure 3-7
Static NAT example
Hide NAT
In the Hide NAT mode, source port numbers of all packets are modified. When return packets enter a firewall, the Security Gateway uses the port number to determine which internal machines the packets are destined for. Port numbers are dynamically assigned from two pools of numbers: 600 to 1023 and 10,000 to 60,000. Port numbers are normally assigned from the second pool. The first pool is used for only three services: rlogin (destination port 512), rshell (destination port 513) and rexec (destination port 514). If the connection uses one of these services, and the original source port is less than 1024, then a port number is assigned from the first pool. This behavior is configurable. The Security Gateway keeps track of all port numbers assigned, so that the original port number is correctly restored for return packets and a port number that is currently in use is not assigned again to a new connection. Hide NAT supports a maximum 50,000 connections per server. This capacity limit is only reached if more than 50,000 connections from Hide NATed internal clients are simultaneously directed at a single server on the unprotected side of the Security Gatewaya highly unlikely scenario. The NAT gateway makes it possible to share a single public address with multiple computers that have private addresses on your intranet. The Internet is unaware of the division you have created between the Internet and your intranet, and treats your multiple computer connection as a single connection. Hide NAT allows only connections that originate on the internal network. This lets an internal host initiate a connection to both inside and outside the intranet, however, a host outside the network cannot initiate a connection to an internal host. The Hide Address is the address behind which the internal network, address range or node is hidden. You can opt to hide the internal address(es) either: Behind a virtual IP address, which is a routable, public IP address that does not belong to any physical machine, or Behind the IP address of the Security Gateway interface through which the packet is routed.
Page 43
NAT Modes
For example, assume the address range 10.1.1.2 to 10.1.1.10 is hidden behind the address of the external interface 192.168.0.1. A connection appears to originate from 10.1.1.3, and the source and destination original and reply packets are translated. Figure 3-8
Hide NAT for and address range
Port Translation
Port Translation allows multiple application servers in a hidden network to be accessed using a single IP address, based on the requested service (or destination port), which saves scarce public IP addresses. A typical implementation enables an FTP server (accessible via port 21), an SMTP server (port 25) and an HTTP server (port 80) to be accessed using a single IP public address. To use Port Translation you need to create manual NAT rules.
Page 44
For example, assume clients in internal networks initiate connections to servers on the Internet. The source addresses of internal clients are NATed to the address of the external interface, either 192.168.0.1 or 172.16.1.1, depending on the interface from which the connection emerges. Figure 3-9
Hide NAT Behind Gateway Interface
Note - Regular NAT rules take precedence over NAT-for-internalnetworks rules. If a connection matches both NAT rule types, the connection is matched to the regular NAT rule. Access rules must also be defined in the Rule Base. See also Configuring Automatic Hide NAT for Internal Networks
Each section in the NAT Rule Base Editor is divided into Source, Destination, and Service. The following actions are performed: Translate Source under Original Packet, to Source under Translated Packet Translate Destination under Original Packet, to Destination under Translated Packet Translate Service under Original Packet, to Service under Translated Packet
Page 45
The exception to this principle is when two automatic rules match a connection, in which case, bidirectional NAT is applied.
Bidirectional NAT
Bidirectional NAT applies to automatic NAT rules in the NAT Rule Base and allows two automatic NAT rules to match a connection. Without bidirectional NAT, only one automatic NAT rule can match a connection. When NAT is defined for a network object, an automatic NAT rule is generated which performs the required translation. If there are two network objects, where one is the source of a connection and the other is the destination, using bidirectional NAT, both automatic NAT rules are applied and both objects are translated. The logic behind bidirectional NAT is: If the first match of a connection is on a Manual NAT rule, no further checking of the NAT Rule Base is performed. If the first match of a connection is on an Automatic NAT rule, the rest of the NAT Rule Base is checked, one rule at a time, to verify whether another Automatic NAT rule matches the connection. If it finds another match, both rules are matched and no further checking is performed.
The operation of bidirectional NAT can be tracked using the SmartView Tracker and the NAT Rule Number and NAT Additional Rule Number fields . The additional rule is the rule that matches the automatic translation performed on the second object in bidirectional NAT.
Page 46
Rule 1 states that for connections within the internal (unprotected) side of the firewall, no NAT takes place. Rule 2 states that for connections initiated on the internal (protected) side of the firewall, the source address of the packets is translated to the public Hide NAT address.
In automatic Hide NAT rules, the translated address is known as the Hiding Address and is used on the unprotected side of the Security Gateway. The actual addresses are private addresses that are used on the protected side of the Security Gateway.
In this example: Rule 1 states that for connections within the internal (unprotected) side of the firewall, no NAT takes place. A packet sent from one machine to another in the same network is not changed. Rule 2 states that for packets originating from the internal (protected) side of the firewall, source addresses are translated to valid (public) static NAT addresses. Rule 3 states that for packets originating from the external (unprotected) side of the firewall, valid (public) destination addresses are translated to static NAT addresses.
In automatic Static NAT rules, statically translated public addresses are called Valid Addresses and are used on the unprotected side of the Security Gateway. The actual addresses are private addresses that are used on the protected side of the Security Gateway.
Page 47
Manually defining NAT rules can be complicated, but it gives you complete control over NAT. The following operations can only be performed using manual NAT rules: Restricting rules to specified destination IP addresses and to specified source IP addresses. Translating both source and destination IP addresses in the same packet. Performing Static NAT in only one direction. Translating services (destination ports). Restricting rules to specified services (ports). Performing NAT on dynamic objects.
Page 48
Configuring NAT
If you are using manual rules, you must configure proxy ARPs to associate the translated IP address with the MAC address of the Security Gateway interface that is on the same network as the translated addresses.
Configuring NAT
General Steps for Configuring NAT
To configure NAT:
1. Determine the IP addresses to be used for translation. 2. Define the network objects. 3. Define the Access rules in the Rule Base. When defining Manual NAT rules, you must define network objects with translated addresses. If using Automatic NAT rules, you must define only one network object per real object. For example, if Static NAT is defined on an object called Alaska_Web, then the Rule Base only needs to refer to Alaska_Web, and there is no need to define a rule for Alaska_Web (Valid Address). 4. Define NAT rules (automatic and/or manual). 5. Install the security policy: Policy > Install.
Page 49
Configuring NAT
2. Select Translation Method Hide and the Hide behind the interface of the Install on Gateway option. 3. Select Install on Gateway. In the above example, the NAT gateway is Alaska_GW, therefore, select either Alaska_GW or All. Packets originating from Alaska_Web, with the Internet as their destination, have their source address translated from 10.1.1.10 to 192.168.0.1. For example, packets originating from the Web server have their source address changed from 172.16.10.3 to 192.168.0.1.
Page 50
Configuring NAT
The Web and mail servers require static translation because incoming connections are made to them from the Internet. Two routable addresses are available. In this example, 192.168.0.5 is used for the Alaska.Web HTTP server and 192.168.0.6 is used for the Alaska.Mail SMTP server. The internal clients require hide translation because they will initiate connections. No incoming connections are allowed to them from the Internet. They will hide behind the external interface of the Security Gateway.
Page 51
Communication between the overlapping internal networks. Communication between the overlapping internal networks and the outside world. Enforcement of a different security policy for each of the overlapping internal networks.
Network Configuration
Figure 3-16
Sample configuration: class C network
For example, assume both Network A and Network B share the same address space (192.168.1.0/24), therefore standard NAT cannot be used to enable communication between the two networks. Instead, overlapping NAT must be performed on a per interface basis. Users in Network A who want to communicate with users in Network B must use the 192.168.30.0/24 network as a destination. Users in Network B who want to communicate with users in Network A must use the 192.168.20.0/24 network as a destination. The Security Gateway translates the IP addresses in the following way for each individual interface:
Interface A
Inbound source IP addresses are translated to the virtual network 192.168.20.0/24. Outbound destination IP addresses are translated to the network 192.168.1.0/24.
Interface B
Inbound source IP addresses are translated to the network 192.168.30.0/24. Outbound destination IP addresses are translated to the network 192.168.1.0/24.
Interface C
Overlapping NAT is not configured for this interface. Instead, use NAT Hide in the normal way (not on a perinterface basis) to hide source addresses behind the interface's IP address (192.168.4.1).
Page 53
Communication Examples
This section describes how to enable communication between internal networks, and between an internal network and the Internet
Security Gateway enforces the security policy for packets from network 192.168.20.0/24 to network 192.168.30.0/24. Interface B before NAT Interface B after NAT 192.168.20.10 192.168.20.10 192.168.30.10 192.168.1.10
Security gateway enforces the security policy for packets from network 192.168.20.0/24 to the Internet. Interface C before NAT Interface C after NAT Hide 192.168.20.10 192.168.4.1 10.10.10.10 10.10.10.10
Routing Considerations
To allow routing from Network A to Network B, routing must be configured on the firewall machine. The following are routing command examples for Windows and Linux operating systems (for other operating systems, use the equivalent commands):
On Windows
route add 192.168.30.0 mask 255.255.255.0 192.168.3.2 route add 192.168.20.0 mask 255.255.255.0 192.168.2.2
On Linux
route add -net 192.168.30.0/24 gw 192.168.3.2 route add -net 192.168.20.0/24 gw 192.168.2.2
Page 54
overlap_nat_src_ipaddr
overlap_nat_netmask
In ordinary Hide NAT configurations, connections cannot be established from the external side the NAT A Security Gateway. However, when using Hide NAT on the Security Management server, gateways can send logs to the Security Management server. When using the Security Management behind NAT feature, the remote gateway automatically selects the Security Management address to be addressed and simultaneously applies NAT considerations.
Network Address Translation Page 55
To define masters and loggers, select Use local definitions for Log Servers and Use local definitions for Masters and specify the correct IP addresses on the gateway. This solution encompasses different scenarios: The remote gateway addresses the NATed IP when you want it to address the real IP. The remote gateway addresses the real IP when you want it to address the NATed IP. In this case, specify the SIC name of the Security Management server in the masters file.
Notes:
Only one object can be defined with these settings, unless the second object is defined as a Secondary Security Management server or as a Log server. Ensure that you properly define the Topology settings on all gateways. All workarounds required for previous versions still function with no changes in their behavior.
IP Pool NAT
An IP Pool is a range of IP addresses (an address range, a network or a group of one of these objects) that is routable to the gateway. IP Pool NAT ensures proper routing for encrypted connections for the following two connection scenarios: SecuRemote/SecureClient to MEP (Multiple Entry Point) gateways Gateway to MEP gateways
When a connection is opened from a SecuRemote/SecureClient or a client behind a gateway to a server behind the MEP Gateways, the packets are routed through one of the MEP gateways. Return packets in the connection must be routed back through the same gateway in order to maintain the connection. To ensure that this occurs, each of the MEP gateways maintains a pool of IP addresses that are routable to the gateway. When a connection is opened to a server, the gateway substitutes an IP address from the IP pool
Page 56
for the source IP address. Reply packets from the server return to the gateway, which restores the original source IP address and forwards the packets to the source. The pool of IP addresses is configured in the IP Pool page of the gateway object. For additional information on how IP Pool NAT is used in MEP scenarios, see "Multiple Entry Point VPNs".
If a remote client opens a connection to the internal network, reply packets from hosts inside the internal networks are routed to the correct gateway interface through the use of static IP pool NAT addresses. The remote VPN client's IP address is NATed to an address in the IP pool on one of the gateway interfaces. The addresses in the IP pool can be routed only through that gateway interface so that all reply packets from the target host are returned only to that interface. Therefore, it is important that the IP NAT pools of the interfaces do not overlap. When the packet returns to the gateway interface, the gateway restores the remote peer's source IP address. The routing tables on the routers that lie behind the gateway must be edited so that addresses from a gateway IP pool are returned to the correct gateway interface. Switching between IP Pool NAT per gateway and IP Pool NAT per interface and then installing the security policy deletes all IP Pool allocation and all NATed connections.
NAT Priorities
IP Pool NAT can be used both for encrypted (VPN) and non-encrypted (decrypted by the gateway) connections.
Page 57
Note - To enable IP Pool NAT for clear connections through the gateway, configure INSPECT changes in the user.def file. For additional information, contact Check Point Technical Support. For non-encrypted connections, IP Pool NAT has the following advantages over Hide NAT: New back connections (for example, X11) can be opened to the NATed host. User-to-IP server mapping of protocols that allow one connection per IP can work with a number of hosts instead of only one host. IPSec, GRE and IGMP protocols can be NATed using IP Pool NAT (and Static NAT). Hide NAT works only with TCP, UDP and ICMP protocols.
Because of these advantages, you can specify that IP Pool NAT has priority over Hide NAT, if both match the same connection. Hide NAT is only applied if the IP pool is used up. The order of NAT priorities are: 1. Static NAT 2. IP Pool NAT 3. Hide NAT Since Static NAT has all of the advantages of IP Pool NAT and more, it has a higher priority than the other NAT methods.
Page 58
The default Do not reuse IP Pool behavior means that each IP address in the IP Pool is used once (connections 1 and 2 in the following illustration). In this mode, if an IP pool contains 20 addresses, up to 20 different clients can be NATed and back connections can be opened from any source to the client. Figure 3-20
No IP Pool Reuse
Switching between Reuse and Do not reuse modes and then installing the security policy, deletes all IP Pool allocations and all NATed connections.
Page 59
8. Click OK. 9. Edit the routing table of each internal router so that packets with an a IP address assigned from the NAT pool are routed to the appropriate gateway or, if using IP Pools per interface, the appropriate gateway interface.
Page 60
Chapter 4
ISP Redundancy
In This Chapter ISP Redundancy Overview Considerations for ISP Link Redundancy Configuring ISP Link Redundancy 61 67 68
ISP Redundancy monitors the ISP links and directs connections to the appropriate link, depending on the operating mode. Two modes are available: Load Sharing and Primary/Backup.
Page 61
The below example shows a typical deployment with a single ISP link and redundant deployment with duplicate ISP links. Figure 4-21
ISP Link Redundancy
Incoming connections (from the Internet to application servers in the DMZ or internal networks) also benefit from the high availability of the two ISP links because the Security Gateway returns packets using the same ISP Link through which the connection was initiated. Furthermore, in Load Sharing mode, incoming connections can reach the application servers through either ISP link because the Security Gateway can answer DNS requests for the IP address of internal servers with addresses from both ISPs by alternating their order.
The status of the ISP links is reported by SmartView Monitor in the Firewall section.
Outgoing Connections
In Load Sharing mode, outgoing traffic that exits the Security Gateway on its way to the Internet is distributed between the ISP Links. You can set a relative weight for how much you want each of the ISP Links to be used. For example, if one link is faster, it can be configured to route more traffic across that ISP link than the other. In Primary/Backup mode, outgoing traffic uses an active primary link. Hide NAT is used to change the source address of outgoing packets to the address of the interface through which the packet leaves the Security Gateway. This allows return packets to be automatically routed through the same ISP link because their destination address is the address of the correct link. Hide NAT is configured by the administrator.
Incoming Connections
For external users to make incoming connections, the administrator must give each application server two routable IP addresses, one for each ISP. The administrator must also configure Static NAT to translate the routable addresses to the real server address. If the servers handle different services (for example, HTTP and FTP), you can use NAT to employ only two routable IP addresses for all the publicly available servers. External clients use one of the two addresses. In order to connect, the clients must be able to resolve the DNS name of the server to the correct IP address. Note - In the following example, the subnets 172.16.0.0/24 and 192.168.0.0/24 represent public routable addresses. In the following example, the Web server www.example.com is assigned an IP address from each ISP: 192.168.1.2 from ISP A, and 172.16.2.2 from ISP B. If the ISP link A is down, 192.168.1.2 becomes unavailable and the clients must be able to resolve www.example.com to 172.16.2.2. An incoming connection is established, based on this example, in the following sequence: 1. When a user in the Internet contacts www.example.com, the client machine sends a DNS query for the IP address. The DNS query reaches the Security Gateway. The Security Gateway has a built-in miniDNS server that can be configured to intercept DNS queries (of type A) for servers in its domain. 2. A DNS query arriving at an interface belonging to one of the ISP links is intercepted by the Security Gateway. 3. If the Security Gateway recognizes the name of the host, it sends one of the following replies: In Primary/Backup mode, the Security Gateway replies only with the addresses associated with the primary link, as long as the primary link is active.
In Load Sharing mode, The Security Gateway replies with two addresses, alternating their order. 4. If the Security Gateway is unable to handle DNS requests (for example, it may not recognize the host name), it passes the DNS query to its original destination or the DNS server of the domain example.com. 5. When the external client receives the reply to its DNS query, it opens a connection. Once the packets reach the gateway, the Security Gateway uses Static NAT to translate the destination address 192.168.1.2 or 172.16.2.2 to the real server address 10.0.0.2. 6. The Security Gateway routes reply packets from the server to the client through the same ISP link that was used to initiate the connection.
ISP Redundancy
Page 63
This command can be executed locally on the gateway or remotely from the Security Management server. When executed from the Security Management server, you must provide the fw isp_link [target] link-name up|down target argument, where <target> is the name of the gateway and <link-name> is the name of the ISP link, as defined in the ISP Redundancy page of the gateway or gateway Cluster object.
ISP Redundancy
Page 64
ISP Redundancy
Page 65
ISP Redundancy
Page 66
A different configuration for Link Selection is required when there are two gateways with two ISPs. Figure 4-26
Two Gateways with Two ISPs
In this case: Gateways A, B, and C have two ISPs. ISP Redundancy is configured on gateway A. Gateway A should use ISP 1 to connect to gateway B and ISP 2 to connect to gateway C. If one of the ISPs becomes unavailable, the other ISP should be used.
For additional configuration information, see the "Link Selection" chapter of the R75.20 VPN Administration Guide (http://supportcontent.checkpoint.com/documentation_download?ID=12285).
ISP Redundancy
Page 67
The simplest configuration is to use a different interface for each ISP link, as shown in Two External Interfaces (on page 64). If only one external interface is available on the Security Gateway, you can connect both ISPs to the same interface by defining two subnets, one for each ISP on the same interface, as shown in One External Interface (on page 65). If one of the ISP links is a dialup network (modem connection) that is used for backup, use the deployment shown in One Permanent and One Dialup (Backup) Interface ("Permanent Link with Dialup for Backup" on page 65) and select the Primary/Backup mode of operation. If the ISP links are connected to a Security Gateway cluster, use the deployment shown in Gateway Cluster Connection (on page 66).
Note - In the following configuration examples, the subnets 192.168.1.0/24 and 172.16.2.0/24 represent public routable addresses.
ISP Redundancy
Page 68
SmartDashboard Configuration
To configure SmartDashboard:
1. Define a Security Rule Base rule that accepts DNS traffic through the Security Gateway using the domain_udp service. 2. In the Security Gateway window > Topology page, define the Security Gateway interfaces leading to the ISPs. 3. Select Topology > ISP Redundancy and then the Support ISP Redundancy option. 4. Perform either Automatic ISP Link Configuration (on page 69) steps 1 through 4 or Manual ISP Link Configuration (on page 69) steps 1 through 5. Automatic configuration only works if there are exactly two external interfaces defined in the Topology page (it does not work for gateway cluster objects).
ISP Redundancy
Page 69
3. In the General tab of the ISP Link Properties window, configure the following: a) Name the ISP link and select the Interface leading to the ISP. b) Specify the Next Hop IP Address by clicking Get from routing table. If the ISP link is a dialup connection, leave the Next Hop IP Address field blank. As shown in Incoming Connections (on page 63), the next hop router on the way to ISP A has the IP address 192.168.1.1 and the next hop router on the way to ISP B has the IP address 172.16.2.1. c) In Primary/Backup mode, define whether the ISP link is Primary. 4. Define a list of hosts to be monitored to verify that the link is operational. To specify the hosts, select the Advanced tab of the ISP Link Properties window and then Add to add the hosts to the list of Selected hosts. 5. Define Tracking by selecting an option for both ISP failure and ISP recovery.
Any
172.16.2.2
http
Any
192.168.1.2
Any
172.16.2.2
If you have a routable address from each ISP for each publicly reachable server (in addition to the addresses that belong to the Security Gateway), you can allow any service to reach the application servers by giving each server a non-routable address. In the NAT Rule Base, do the following: a) Use the routable addresses in the Original Destination. b) Use the non-routable address in the Translated Destination. c) Select Any as the Original Service. Note - If using Manual NAT, automatic arp does not work for the NATed addresses. On Linux and SecurePlatform use local.arp. On IPSO set up Proxy ARP. 3. Save and install the security policy: Policy > Install.
ISP Redundancy
Page 70
ISP Redundancy
Page 71
Chapter 5
ConnectControl - Server Load Balancing
In This Chapter Introduction to ConnectControl Load-Balancing Methods ConnectControl Packet Flow Logical Server Types Persistent Server Mode Server Availability Load Measuring Configuring ConnectControl 72 72 73 73 75 77 77 77
Introduction to ConnectControl
ConnectControl is Check Point's solution for server load balancing. ConnectControl distributes network traffic among a number of servers, which reduces the load on a single machine and thereby improves network response time and provides high availability. In addition to the performance benefits, spreading the load over multiple machines creates redundancy for your application and reduces the risk of downtime. Load-balanced servers are represented by a single virtual IP address, so clients are unaware that more than one server is serving their requests. This is accomplished using a Logical server, which is a network object defined in SmartDashboard that represents a group of physical servers. The Logical server fields service requests for the load-balanced application and directs them to the appropriate physical server. ConnectControl runs on the gateway and does not impose any additional memory or processing requirements. It continuously checks the availability of each server and if a server fails or is unreachable, ConnectControl stops directing connections to that server until it becomes available.
Load-Balancing Methods
ConnectControl distributes network traffic to load-balanced servers according to predefined balancing methods, which include: Server Load: Measures the load on each server to determine which server has the most available resources to service a request. Each server in the group runs a load measuring agent that automatically reports the current system load to ConnectControl on the Security Gateway. Server Load is a good choice if your servers run other demanding applications in addition to supporting your load-balanced application. See also Load Measuring (on page 77). Round Trip: Ensures that incoming requests are handled by the server with the fastest response time. ConnectControl ascertains the response times of the servers in the group at a user-defined interval, whereupon the gateway executes a series of ICMP echo requests (pings) and reports which server has the shortest average round trip time. ConnectControl then directs the service request to that server. The round trip method is a good choice if there are large variations in the traffic load on your network or when load balancing over WAN connections.
Page 72
Round Robin: Assigns service requests to the next server in the sequence. The round robin method provides optimal load balancing when the load balanced servers all have similar RAM and CPU and are located on the same segment. Random: Assigns service requests to servers at random. The random method provides optimal load balancing when the load-balanced servers all have similar RAM and CPU and are located on the same segment. Domain: Directs service requests based on domain name.
HTTP
The HTTP Logical server type employs HTTP redirection to distribute network traffic and supports only HTTP services. The redirection mechanism ensures that all sessions comprising an HTTP connection are directed to a single server. This is critical for many Web applications, such as those using HTTP-based forms, which require that a single server process all user data.
Page 73
The HTTP redirection mechanism works in conjunction with ConnectControl's load-balancing methods. The initial HTTP connection is directed to the proper server based on the selected load-balancing method. ConnectControl then notifies the client that subsequent connections should be directed to the IP address of the selected physical server, rather than to the IP address of the Logical server. The IP address can be the address of a server behind the firewall or of an offsite server. The remainder of the session is conducted without ConnectControl intervention and all operations are transparent to the user. The Logical server may direct the client to an HTTP server behind the firewall or to an offsite HTTP server, depending on the result of ConnectControl's load balancing. Figure 5-28
Packet Flow in an HTTP Logical Server
All further communication between the client and the server takes place without the intervention of ConnectControl.
Page 74
Other
The Other Logical server type can be used for all services supported by A Security Gateway including HTTP. It uses NAT to direct network traffic to the grouped servers. ConnectControl mediates each service request, even when clients continue a session. When you create an Other Logical server type, ConnectControl allows the connection by automatically placing entries in the Security Gateway kernel table. ConnectControl determines which server receives the request and uses NAT to modify the destination IP address of the incoming packet. If a return connection is opened, the connection is automatically established between the server and the client and the server's source address in the packet is translated to that of the Logical server. The following illustration shows a connection being directed to a NATed FTP server inside the firewall. Figure 5-29
Packet Flow using an "Other" Logical Server type
On the packet's return, the firewall translates the packet's original address to that of the Logical server. You can also use an Other Logical server type to handle HTTP service requests. In contrast to the HTTP type, once a connection between the client and server has been established, the Other Logical server type does not disconnect. Instead, ConnectControl handles each HTTP service request from the client and multiple service requests from one client can be directed to different servers.
Page 75
Persistency By Server
Persistency by server is useful for certain types of HTTP applications, such as forms support in a loadbalanced environment comprised of multiple Web servers. When Persistency by server is enabled, ConnectControl directs an HTTP client to a specific server and each subsequent request by the client is directed to the same server. This mode allows clients to fill out forms without the data loss that occurs if separate service requests are directed to different servers. If you support forms, enable Persistent server mode (the default setting) and the Persistency by server option.
Persistency By Service
The persistency by service feature is useful if you are load balancing multiple services in your server group, for example, in a redundant environment of two machines, each running HTTP and FTP. Figure 5-30
Example of Persistency by Service
Using persistency by service, the client can be directed to one server for HTTP services and another for FTP services. This prevents you from being locked in to a server under a heavy load, as may occur if you opt for persistency by server in this configuration. Persistency by service directs previously load-balanced clients, which request a different service, to be load balanced and directed once again to the correct server.
Page 76
Server Availability
Server Availability
You can configure various properties of ConnectControl in order to check the availability of servers in the Logical server group. You can define how often the gateway pings the servers to ensure they are still active and the number of attempts it makes to contact a nonresponsive server after ConnectControl stops directing connections to it. These settings are located in the ConnectControl page of the Global Properties window. The Server availability check interval option defines how often the servers are pinged. The Server check retries option defines the number of attempts to contact nonresponsive servers.
Load Measuring
The server load-balancing method is unique because it requires a load-measuring agent to run on each server in the group. The agent is lightweight and does not add additional latency or system overhead to the server. It uses the UDP transport protocol to support communication between the load-measuring agent and ConnectControl. Check Point provides a sample load-measuring agent application for installation on servers, as well as a load-measuring application programming interface (API) for organizations who want to write their own agents. You can download the load agent application for your OS from the Check Point Support site (http://supportcontent.checkpoint.com/solutions?id=47.0.1569467.2530820). Sign in to view the solution. You can configure certain properties of the load-measuring agent in the ConnectControl page of the Global Properties window. The Load agents port property determines the port that the load agent uses to communicate with the Security Gateway. All the load-measuring agents in a configuration must use the same port number. The Load measurement interval property defines the interval at which the agent returns information about the server's load to the firewall (the default is every 20 seconds). For Windows servers, configure and enable the load-measuring agent using the load_agent_nt <port_number> <load_value> syntax. The default port used by ConnectControl is 18212. The values for load_value are 0, 1, 2, where: 0 measures the load over a 1 minute interval 1 measures the load over a 5 minute interval 2 measures the load over a 15 minute interval
Configuring ConnectControl
To configure ConnectControl:
1. In SmartDashboard, right-click Network Objects in the Network Objects tree and select New > Node > Host. 2. Define a server object that represents a load-balanced server. 3. Repeat step 2 for each server you place in the group. 4. In Security Management, right-click Network Objects and select New > Group > Simple Group. 5. Name the group (for example, HTTP_Server_Group). 6. Add the server objects to the group in the Group Properties box. It is recommended to add no more than 29 Logical servers to a group. 7. In SmartDashboard, right-click Network Objects in the Network Objects tree and select New > Logical Server. Ensure the IP address you assign is a routable IP address. All traffic to be loadbalanced should be directed through the gateway. 8. Select the Server's Type. 9. Add the Group object you created in step 3 to the Servers Group. 10. To enable Persistent server mode, select either Persistency by service or server (the default mode is Persistency by service). 11. Select a load-balance method as the Balance Method. 12. Add the following rule to the Rule Base:
Page 77
Configuring ConnectControl
Table 5-10 Load Balancing Rule Source Any Destination Logical_Server Service Action
13. For applications using HTTP redirection (HTTP Logical server type), add a second rule to allow the physical server group to communicate directly with clients after sessions have started. Table 5-11 Server Group Connection Rule Source Any Destination HTTP_Server_Group Service http Action Accept
14. From the Policy menu, select Global Properties > ConnectControl. Review the default settings and adjust according to your implementation. The following options are available: Servers Availability: Manages how often ConnectControl ensures that the load-balanced servers are running and responding to service requests and how many times ConnectControl attempts to contact a server before ceasing to direct traffic to it. The Server availability check interval option default value is 20 seconds. The Server check retries option default value is 3 times. Servers Persistency: Defines the amount of time that a client, once directed to a particular server, directs traffic to it. The Persistent server timeout option default value is 1800 seconds. Servers Load Balancing: Manages how often the load measuring agents (if employed) report their load status to ConnectControl and the port from which they communicate with ConnectControl. The Load agents port option default value is 18212. The Load measurement interval default value is 20 seconds.
Page 78
Chapter 6
Bridge Mode
In This Chapter Introduction to Bridge Mode Limitations in Bridge Mode Configuring Bridge Mode 79 79 80
The network address is 192.168.1.0 and objects labeled S-* are switches. For IP routing, the firewall is transparently inserted into the existing network, leaving the 192.168.1.0 subnet on both sides of the firewall. Internal traffic is inspected and authorized by the firewall, without changes to the IP routing scheme. Traffic that is accepted by the firewall is forwarded from one interface to the other. See also Bridging Interfaces (on page 80).
Page 79
Bridge mode is supported on the Check Point operating system SecurePlatform. Important - To manage a gateway in bridge mode, an interface with an IP address is required. It is important to configure a separate, routed interface for this purpose.
Configuring Anti-Spoofing
When bridging interfaces, it is not possible to define the network behind a bridged interface by IP address and subnet, since this is true for the other interface of the bridge. If anti-spoofing is required for the bridged interfaces, see Configuring Anti-Spoofing for Internal Interfaces for instructions on defining IP addresses ranges behind each of the bridged interfaces. Do not use the same network for both interfaces, as this may cause a loss of connectivity.
The brctl show command report displays the following results: bridge name: The name given to the bridge. bridge id: The unique identifier of the bridge. Interfaces: The names of the two interfaces in the bridge.
Bridge Mode
Page 80
The MAC address of the bridge is inherited from one of the physical interfaces.
Bridge Mode
Page 81
Chapter 7
CoreXL Administration
In This Chapter CoreXL Performance Tuning Configuring CoreXL Command Line Reference 82 83 86 86
CoreXL
CoreXL is a performance-enhancing technology for Security Gateways on multi-core processing platforms. CoreXL enhances Security Gateway performance by enabling the processing cores to concurrently perform multiple tasks. CoreXL provides almost linear scalability of performance, according to the number of processing cores on a single machine. The increase in performance is achieved without requiring any changes to management or to network topology. CoreXL joins ClusterXL Load Sharing and SecureXL as part of Check Point's fully complementary family of traffic acceleration technologies. In a CoreXL gateway, the firewall kernel is replicated multiple times. Each replicated copy, or instance, of the firewall kernel runs on one processing core. The instances handle traffic concurrently, and each instance is a complete and independent inspection kernel. Regarding network topology, management configuration, and security policies, a CoreXL gateway functions as a regular Security Gateway. All of the kernel instances of a gateway handle traffic going through the same gateway interfaces and apply the same gateway security policy.
To enable a non-supported feature in the Check Point Suite, disable CoreXL using cpconfig and reboot the gateway (see Configuring CoreXL (on page 86)).
Default Configuration
Upon installation of CoreXL, the number of kernel instances is derived from the total number of cores in the system, as follows:
Page 82
Performance Tuning
The default affinity setting for all interfaces is Automatic when Performance Pack is installed. See Processing Core Allocation (on page 83). Traffic from all interfaces is directed to the core running the Secure Network Distributor (SND).
Performance Tuning
The following sections are relevant only for SecurePlatform.
Traffic entering network interface cards (NICs) is directed to a processing core running the SND. The association of a particular interface with a processing core is called the interface's affinity with that core. This affinity causes the interface's traffic to be directed to that core and the SND to run on that core. Setting a kernel instance or a process to run on a particular core is called the instance's or process's affinity with that core. The default affinity setting for all interfaces is Automatic. Automatic affinity means that if Performance Pack is running, the affinity for each interface is automatically reset every 60 seconds, and balanced between available cores. If Performance Pack is not running, the default affinities of all interfaces are with one available core. In both cases, any processing core running a kernel instance, or defined as the affinity for another process, is considered unavailable and will not be set as the affinity for any interface. In some cases, which are discussed in the following sections, it may be advisable to change the distribution of kernel instances, the SND, and other processes, among the processing cores. This is done by changing the affinities of different NICs (interfaces) and/or processes. However, to ensure CoreXL's efficiency, all interface traffic must be directed to cores not running kernel instances. Therefore, if you change affinities of interfaces or other processes, you will need to accordingly set the number of kernel instances and ensure that the instances run on other processing cores. Under normal circumstances, it is not recommended for the SND and an instance to share a core. However, it is necessary for the SND and an instance to share a core when using a machine with exactly two cores.
CoreXL Administration
Page 83
Performance Tuning
If any of the above conditions are not met, the default configuration of one processing core allocated to the SND is sufficient, and no further configuration is necessary. Allocating an additional processing core to the SND requires performing the following two stages in the order that they appear: 1. Reduce the number of kernel instances using cpconfig. 2. Set interface affinities to the remaining cores, as detailed below. 3. Reboot to implement the new configuration.
CoreXL Administration
Page 84
Performance Tuning
Setting Interface Affinities when Performance Pack is not Running If Performance Pack is not running, interface affinities are loaded at boot from a configuration text file called fwaffinity.conf, located under: $FWDIR/conf . In the text file, lines beginning with the letter i define interface affinities. If Performance Pack is running, interface affinities are defined by sim affinity settings, and lines beginning with i in fwaffinity.conf are ignored. If you are allocating only one processing core to the SND, it is best to have that core selected automatically by leaving the default interface affinity set to automatic, and having no explicit core affinities for any interfaces. To do this, make sure fwaffinity.conf contains the following line: i default auto In addition, make sure that fwaffinity.conf contains no other lines beginning with i, so that no explicit interface affinities are defined. All interface traffic will be directed to the remaining core. If you are allocating two processing cores to the SND, you need to explicitly set interface affinities to the two remaining cores. If you have multiple interfaces, you need to decide which interfaces to set for each of the two cores. Try to achieve a balance of expected traffic between the cores (you can later check the balance by using the top command).
To allocate a processing core to the fwd daemon, you need to do two things:
1. Reduce the number of kernel instances using cpconfig. 2. Set the fwd daemon affinity, as detailed below.
CoreXL Administration
Page 85
Configuring CoreXL
Affinities for Check Point daemons (such as the fwd daemon), if set, are loaded at boot from the fwaffinity.conf configuration text file located at: $FWDIR/conf . Edit the file by adding the following line: n fwd <cpuid> where <cpuid> is the number of the processing core to be set as the affinity of the fwd daemon. For example, to set core #2 as the affinity of the fwd daemon, add to the file: n fwd 2 Reboot for the fwaffinity.conf settings to take effect.
Configuring CoreXL
To enable/disable CoreXL:
1. 2. 3. 4. Run the cpconfig command. Select Configure Check Point CoreXL. Choose whether to enable or disable CoreXL. Reboot the gateway.
Note - In a clustered deployment, changing the number of kernel instances should be treated as a version upgrade. See Command Line Reference (on page 86).
fwaffinity.conf
fwaffinity.conf is located in the $FWDIR/conf directory.
CoreXL Administration
Page 86
Syntax
Each line in the text file uses the same format: <type> <id> <cpu>
Data <type>
Values i n k
Description interface Check Point daemon kernel instance if <type> = i if <type> = n if <type> = k interfaces that are not specified in another line number(s) of processing core(s) to be set as the affinity all processing cores are available to the interface traffic, daemon or kernel instance no specified affinity (useful for excluding an interface from a default setting) Automatic mode See also Processing Core Allocation (on page 83).
<id>
<cpuid>
<number>
all
ignore
auto
Note - Interfaces that share an IRQ cannot have different cores as their affinities, including when one interface is included in the default affinity setting. Either set both interfaces to the same affinity, or use ignore for one of them. To view the IRQs of all interfaces, run: fw ctl affinity -l -v -a .
fwaffinty_apply
fwaffinity_apply is located in the $FWDIR/scripts directory. Use the following syntax to execute the command: $FWDIR/scripts/fwaffinity_apply <option> where <option> is one of the following parameters:
Parameter -q -t <type> -f
Description Quiet mode - print only error messages. Only apply affinity for the specified type. Sets interface affinity even if automatic affinity is active.
CoreXL Administration
Page 87
fw ctl affinity
The fw ctl affinity command controls affinity settings. However, fw ctl affinity settings will not persist through a restart of the Security Gateway. To set affinities, execute fw ctl affinity -s. To list existing affinities, execute fw ctl affinity -l.
fw ctl affinity -s
Use this command to set affinities. fw ctl affinity -s settings are not persistent through a restart of the Security Gateway. If you want the settings to be persistent, either use sim affinity (a Performance Pack command - see the R75.20 Performance Pack Administration Guide (http://supportcontent.checkpoint.com/documentation_download?ID=12274) for details) or edit the fwaffinity.conf configuration file. To set interface affinities, you should use fw ctl affinity only if Performance Pack is not running. If Performance Pack is running, you should set affinities by using the Performance Pack sim affinity command. These settings will be persistent. If Performance Pack's sim affinity is set to Automatic mode (even if Performance Pack was subsequently disabled), you will not be able to set interface affinities by using fw ctl affinity -s.
Syntax
fw ctl affinity -s <proc_selection> <cpuid> <proc_selection> is one of the following parameters: Parameter -p <pid> Description Sets affinity for a particular process, where <pid> is the process ID#. Sets affinity for a Check Point daemon, where <cpdname> is the Check Point daemon name (for example: fwd). Sets affinity for a kernel instance, where <instance> is the instance's number. Sets affinity for an interface, where <interfacename> is the interface name (for example: eth0).
-n <cpdname>
-k <instance>
-i <interfacename>
<cpuid> should be a processing core number or a list of processing core numbers. To have no affinity to any specific processing core, <cpuid> should be: all.
Note - Setting an Interface Affinity will set the affinities of all interfaces sharing the same IRQ to the same processing core. To view the IRQs of all interfaces, run: fw ctl affinity -l -v a
Example
To set kernel instance #3 to run on processing core #5, run: fw ctl affinity -s -k 3 5
CoreXL Administration
Page 88
fw ctl affinity -l
Use this command to list existing affinities. For an explanation of kernel, daemon and interface affinities, see CoreXL Administration (on page 82).
Syntax
fw ctl affinity -l [<proc_selection>] [<listtype>] If <proc_selection> is omitted, fw ctl affinity -l lists affinities of all Check Point daemons, kernel instances and interfaces. Otherwise, <proc_selection> is one of the following parameters: Parameter -p <pid> Description Displays the affinity of a particular process, where <pid> is the process ID#. Displays the affinity of a Check Point daemon, where <cpdname> is the Check Point daemon name (for example: fwd). Displays the affinity of a kernel instance, where <instance> is the instance's number.
-n <cpdname>
-k <instance>
-i <interfacename> Displays the affinity of an interface, where <interfacename> is the interface name (for example: eth0). If <listtype> is omitted, fw ctl affinity -l lists items with specific affinities, and their affinities. Otherwise, <listtype> is one or more of the following parameters: Parameter -a -r Description All: includes items without specific affinities. Reverse: lists each processing core and the items that have it as their affinity. Verbose: list includes additional information.
-v
Example
To list complete affinity information for all Check Point daemons, kernel instances and interfaces, including items without specific affinities, and with additional information, run: fw ctl affinity -l -a -v
CoreXL Administration
Page 89
Chapter 8
Anti-Virus
In This Chapter Anti-Virus Protection 90
Anti-Virus Protection
Introduction to Integrated Anti-Virus Protection
Viruses are a major threat to an network operations and have become increasingly dangerous and sophisticated. For example, worms, blended threats (which use combinations of malicious code and vulnerabilities for infection and dissemination) and trojans. Integrated Anti-Virus solutions require no extra IT resources and organizations benefit from their easy management in the familiar Check Point SMART infrastructure, which includes policy management, logging and monitoring. As a single box solution, hardware management is also simplified. Anti-Virus protection is available for the HTTP, FTP, SMTP and POP3 protocols. By default, all protocols are scanned and options for each protocol can be centrally configured.
Architecture
When Anti-Virus scanning is enabled, scanning is performed in one of the following detection modes: Proactive mode - a file-based solution where traffic for the selected protocols is trapped in the kernel and forwarded to the security server. The security server forwards the data stream to the Anti-Virus engine. The data is allowed or blocked based on the response of the Anti-Virus engine. Stream mode - where traffic for the selected protocols is processed in the kernel on the stream of data without storing the entire file. The data is allowed or blocked based on the response of the kernel.
The POP3 and FTP protocols work only in Proactive mode. The SMTP and HTTP protocols can be configured to work in either Proactive or Stream mode. Anti-Virus scanning is applied only to accepted traffic that has been allowed by the security policy.
Page 90
Anti-Virus Protection
c) From the File Types page, configure whether to Scan, Block or Pass traffic according to the file type and configure continuous Download settings. d) From the Settings page, configure options for file handling and scan failures.
Database Updates
The following kinds of database updates are available: Automatic: Updates of the virus signature can be scheduled at a predefined interval. Manual: Updates of virus signatures can be initiated at any time.
Download updates from a Check Point server prior to downloading signature updates. First verify that: HTTP and HTTPs Internet connectivity with DNS is properly configured. You have a valid Check Point User Center user name and password.
The following signature update methods are available (the default update interval is 120 minutes for all methods): Download signature updates every x minutes: Enables you to define the update interval. Download from Check Point site: Indicates that each Security Gateway is responsible for contacting Check Point's site to obtain Anti-Virus signatures. Updates are downloaded directly to the CI gateways. This method usually results in faster update times. Download from My local Security Management server: Indicates that updates are only downloaded by the Security Management server from the default Check Point signature distribution server and then redistributed all CI gateways. This method is useful when Internet access is not available for all gateways or if the download can only occur once for all the gateways.
Anti-Virus
Page 91
Anti-Virus Protection
Scan By IP Address
Scan by IPs enables you to define which traffic is scanned. For example, if all incoming traffic from external networks reaches the DMZ using Scan by IPs, you can configure CE to scan only traffic to the FTP, SMTP, HTTP and POP3 servers. Conversely, Scan by File Direction scans all traffic to the DMZ. When using Scan by IPs, use a Rule Base to specify the source and destination of the data to be scanned. For FTP, for each rule, you can scan either the GET or the PUT methods, or both. For HTTP, for each rule, you can scan either the HTTP Request, the HTTP Response or both.
Anti-Virus
Page 92
Anti-Virus Protection
Anti-Virus
Page 93
Anti-Virus Protection
Anti-Virus
Page 94
Anti-Virus Protection
What is a DMZ?
The DMZ (demilitarized zone) is an internal network with an intermediate level of security. Its security level lies between trusted internal networks, such as a corporate LAN, and non-trusted external networks, such as the Internet. Typically, the DMZ contains devices accessible to Internet traffic, for example, Web (HTTP), FTP, SMTP (email), DNS and POP3 servers. Scan By File Direction enables you to define a level of Anti-Virus scanning that is specific to the DMZ. For example, you can decide not to scan traffic passing from external networks to the DMZ, but to still scan traffic passing from the DMZ to internal networks and from the external to internal networks.
Figure 8-36
Outgoing files leaving: Files leaving through external interfaces: the internal networks (1), the DMZ (2) and the DMZ and internal networks (1 and 2).
Scanning Options for Leaving Outgoing Files
Figure 8-37
Anti-Virus
Page 95
Anti-Virus Protection
Internal files: If there is no DMZ, files passing between all internal networks (1). If there is a DMZ, files passing between the DMZ and internal networks and files passing between all internal networks (between internal networks (1), from the DMZ to internal networks (2) and from internal networks to the DMZ (3)).
Scanning Options for Internal Files
Figure 8-38
In newly installed systems, stream mode is activated by default. In upgraded systems, the detection mode that is activated by default is dependent upon whether the AntiVirus feature was previously activated or not. In upgraded systems that previously used the Anti-Virus scanning feature, proactive detection is activated by default. In upgraded systems that previously did not use the Anti-Virus scanning feature, stream mode detection is activated by default.
You can configure which detection mode to use from SmartDashboard for the SMTP and HTTP protocols.
Continuous Download
The Anti-Virus engine acts as a proxy which caches the scanned file before delivering it to the client for files that need to be scanned. When scanning large files, if the whole file is scanned before being made available, the user may experience a long delay before the file is delivered. A similar problem may arise when using client applications with short timeout periods (for example, certain FTP clients) to download large files. If the whole file is cached and scanned before being delivered, the client applications may time out while waiting.
Anti-Virus
Page 96
Anti-Virus Protection
To address this problem, Continuous Download starts sending information to the client while Anti-Virus scanning is still taking place. If a virus is found during the scan, file delivery to the client is terminated. Note - Continuous Download is only relevant if you have selected to use the Activate proactive detection option. You can specify the file types for which you do not want Continuous Download to occur. Some file types (for example, Adobe Acrobat PDF and Microsoft Power Point files) can open on a client computer before the whole file has been downloaded. If Continuous Download is allowed for those file types, and a virus is present in the opened part of the file, it could infect the client computer. Note - The SMTP and POP3 protocols support Continuous Download for the entire email message.
File types are considered to be safe if they are not known to contain viruses, for example, some picture and video files are considered safe. Other formats are considered to be safe because they are relatively hard to tamper with. What is considered to be safe changes according to published threats and depends on how the administrator balances security versus performance considerations. IPS reliably identifies binary file types by examining the file type signatures (magic numbers). IPS does not rely on the file extension (such as *.GIF), which can be spoofed. It also does not use the MIME headers (such as image/gif) in HTTP and mail protocols, which can also be spoofed.
Anti-Virus
Page 97
Anti-Virus Protection
Configuring Anti-Virus
For detailed explanations regarding the options described in the procedures in this section, see Understanding Anti-Virus Scanning Options (on page 92).
Block 3. Select tracking options for blocked, SMTP and POP3 mail. Tracking options include: None (no logging) Log Popup alert Mail alert SNMP trap alert Three custom user-defined scripts
Block 3. When scanning by File Direction, select a scanning direction for: Incoming files Outgoing files Internal files through the gateway
Anti-Virus
Page 98
Anti-Virus Protection
4. When scanning by IPs, create rules for the Rule Base to specify the source and destination of the data to be scanned. 5. For SMTP and HTTP, select the Activate Proactive Detection (impacts performance) checkbox to enable file-based anti-virus detection. Clear the checkbox to enable stream mode detection. See Understanding Proactive and Stream Mode Detection (on page 96) for further information. FTP and POP3 are set to Proactive Detection mode automatically. 6. If Proactive Detection has been configured, select the Activate Continuous Download checkbox to avoid client time-outs when large files are scanned. See Continuous Download (on page 96) for further information.
In the Anti-Spam tab, click Anti-Virus > Security Gateway > File Types page and set the actions. See File Type Recognition (on page 97) for more information.
In this window, you can also configure Continuous Download options. Continuous Download options are only relevant if scanning is set to Proactive Detection. See Continuous Download (on page 96) for more information.
Scan Failure
The following scan failure options are available: When Anti-Virus engine is overloaded or scan fails: Determines whether to scan or block the file. When Anti-Virus engine fails to initialize: Determines whether to scan or block the file.
File Handling
The following file handling options are available: Maximum file size to scan: Limits the file size that is allowed to pass through the gateway. If the file is a compressed archive, the limit applies to the file after decompression (the Anti-Virus engine decompresses archives before scanning them). Before performing Anti-Virus scanning, the gateway
Anti-Virus
Page 99
Anti-Virus Protection
reassembles the entire file and then scans it. The limit protects the gateway resources and the destination client. An archive is a file that contains one or more files in a compressed format. Archives (and all other file types) are recognized by their binary signature. By default, any file type that is not identified as nonarchive is assumed to be an archive and the Anti-Virus engine tries to expand it. When file exceeds limit: Determines whether to scan or block the file. Note - An email is treated as an archive and as a result it is not affected when the file exceeds the limit.
Anti-Virus
Page 100
Chapter 9
Anti-Spam and Mail
In This Chapter Introduction to Anti-Spam and Mail Security Mail Security Overview Configuring Anti-Spam Configuring Anti-Virus Protection for Mail Configuring a Disclaimer Anti-Spam Logging and Monitoring Reporting False Positives to Check Point Anti-Spam Tracking and Reporting Options 101 102 104 107 109 109 110 110
IP Reputation Anti-Spam
Page 101
Figure 9-39
Anti-Spam
The Anti-Spam functionality employs unique licensed technology. Unlike many Anti-Spam applications that rely on searching for keywords and a lexical analysis of the content of an email message, Check Point AntiSpam identifies spam by analyzing known and emerging distribution patterns. By avoiding a search for key words and phrases that might classify a legitimate email as spam and instead focusing on other message characteristics, this solution offers a high spam detection rate with a low number of false positives. To preserve personal privacy and business confidentiality, only select characteristics are extracted from the message envelope, headers, and body (no reference to actual content or attachments are included). Hashed values of these message characteristics are sent to a Detection Center for pattern analysis. The Detection Center identifies spam outbreaks in any language, message format, or encoding type. Responses are returned to the enterprise gateway within 300 milliseconds. Once identified, the network of spam generating machines is blacklisted. If the network changes its behavior, it is removed from the black list.
Page 102
1. Proxy SMTP server on the gateway receives incoming mail 2. The SMTP proxy forwards the mail to an Anti-Spam daemon to extract selected message characteristics, and produce a hash fingerprint. 3. Using a special Anti-Spam protocol, the Anti-Spam daemon queries the Detection center. The hashed fingerprint is compared to other fingerprints in the pattern repository to determine whether the email is spam. 4. The detection classifies the email as either spam or not spam, and returns the result to the gateway. 5. If the email has been classified as spam, the email is flagged as such (in the header or subject) and forwarded to the enterprise mail server. 6. The mail server forwards the email to its recipient on the network. Because the header or subject has been flagged as spam, recipients can use that tag or marker to set up filtering rules in their native mail program for example in Microsoft Outlook a rule can be configured to delete all emails with the word SPAM in either the subject line or header. To prevent delays while large email files are scanned for Spam, a feature known as Adaptive Continuous Download transfers email to the recipient while Anti-Spam detection takes place.
Page 103
Configuring Anti-Spam
Configuring Anti-Spam
Configuring a Content Anti-Spam Policy
A content Anti-Spam policy is set on the Anti-Spam & Mail tab of SmartDashboard > Anti-Spam > Content based Anti-Spam. 1. 2. 3. 4. Use the slider to select an Anti-Spam policy protection level. Select flagging options. In the Security Gateway Engine settings section, set a maximum data size to scan. In the UTM-1 Edge Engine settings section, set a confidence level for spam and suspected spam. A spam confidence level is a grade or rating (usually between zero and a hundred) used decide whether a particular email message should be treated as spam. For example, if the confidence level is set to 70, then all email messages rated at 70 or above will be treated as spam. UTM-1 Edge devices contain their own Anti-Spam engines. Values entered in the UTM-1 Edge Engine settings section are used to correlate SofaWare Anti-Spam engine ratings with Check Point Anti-Spam engine ratings. For example if a particular email message is rated by the SofaWare Anti-Spam engine as 90, and this value, once translated into Check Point ratings, means the email should be treated as spam, then the Actions defined for Spam or Suspected spam on the Anti-Spam Policy page are enforced. 5. Select Tracking Options for Spam, Suspected Spam, or Non Spam. Tracking options include: None (no logging) Log Popup Alert Mail Alert SNMP trap alert Three custom user-defined scripts.
Page 104
Configuring Anti-Spam
2. Select tracking options for Spam, Suspected Spam, or Non spam. Tracking options include None (no logging) Log Popup Alert Mail Alert SNMP trap alert Three custom user-defined scripts.
2. In the Blocked senders\domains section, click Add and enter the name of a sender or domain to be rejected. 3. In the Blocked IPs section, click Add and enter an IP address that should be blocked. 4. From the drop-down list in the Tracking section, select a tracking option for blocked mail or non-spam.
Internal files through the gateway 2. Select Activate Continuous download to avoid client time-outs when large files are scanned. See Adaptive Continuous Download ("Continuous Download" on page 96) for further information.
Internal files 2. Select Activate Continuous download to avoid client time-outs when large files are scanned. See Adaptive Continuous Download ("Continuous Download" on page 96) for further information.
Page 105
Configuring Anti-Spam
Page 106
Block 3. Select tracking options for blocked, SMTP and POP3 mail. Tracking options include: None (no logging) Log Popup alert Mail alert
Block 3. When scanning by File Direction, select a scanning direction for: Incoming files Outgoing files
Internal files through the gateway 4. When scanning by IPs, create rules for the Rule Base to specify the source and destination of the data to be scanned. 5. For SMTP and HTTP, select the Activate Proactive Detection (impacts performance) checkbox to enable file-based anti-virus detection. Clear the checkbox to enable stream mode detection. See Understanding Proactive and Stream Mode Detection (on page 96) for further information. FTP and POP3 are set to Proactive Detection mode automatically. 6. If Proactive Detection has been configured, select the Activate Continuous Download checkbox to avoid client time-outs when large files are scanned. See Continuous Download (on page 96) for further information.
Page 108
Configuring a Disclaimer
In the Anti-Spam & Mail tab, click Anti-Virus > Security Gateway > File Types page and set the actions.
Configuring Settings
Define maximum sizes for files and archives that should be scanned. Configure actions to take if the set limits are exceeded, or when a scan fails. In the Anti-Spam & Mail tab, click Anti-Virus > Security Gateway > Settings page, configure the fields.
Configuring a Disclaimer
You can create your own custom disclaimer notice.
1. In the Anti-Spam & Mail tab, click Advanced > Disclaimer. 2. Select Add disclaimer to email scanned by Anti-Virus and Anti-Spam engines. 3. In the text box, type your disclaimer notice.
Anti-Spam status is monitored using SmartView Monitor. The Anti-Spam status appears under the Firewall product. The status contains information such as the Anti-Spam engine version. Anti-Spam status also includes statistics regarding scanned files. See also: Tracking and Reporting Options ("Anti-Spam Tracking and Reporting Options" on page 110).
Page 110
SmartView Tracker
SmartView Tracker logs Anti-Spam activity. Record details exist for Number, Date, Time, Product, Interface, Origin, Type, Action, Service, Source, Source country, Destination, Sender, Original sender, Recipients, Original recipients, Spam category, Control, and Information. Right-clicking on a row displays a new Follow Email Session ID option. Following the session provides granular information.
SmartView Monitor
SmartView Monitor reports on Anti-Spam and Anti-Virus activity.
SmartReporter
New express reports for content inspection have been added to SmartReporter: Anti-Virus Anti-Spam
Page 111
Chapter 10
Securing Voice Over IP
In This Chapter Introduction to the Check Point Solution for Secure VoIP Control Signaling and Media Protocols VoIP Handover VoIP Application Intelligence VoIP Logging Protocol-Specific Security 112 113 113 114 116 116
The Security Gateway ensures that caller and recipient addresses are where they claim to be and that the caller and recipient are allowed to make and receive VoIP calls. In addition, the firewall examines the contents of the packets passing through every allowed port to ensure that they contain the correct information. Full stateful inspection on H.323, SIP, MGCP and SCCP commands ensures that all VoIP packets are structurally valid, and that they arrive in a valid sequence.
Page 112
Control signals open both fixed (known) and dynamic ports. The parties of a call then use control signals to negotiate dynamically assigned ports that each side opens to receive the RTP/RTCP media stream.
VoIP Handover
The simplest method of communication between VoIP endpoints is to send both the Signaling and media from endpoint to endpoint. In many VoIP networks, however, the endpoints do not know the location of their peers. In this case, the call is managed by a handover device, which allows a VoIP call to reach its peer. When a handover device is used, the Signaling follows a different route through the network than the media. Handover is performed in the following manner: SIP: By the Proxy and/or Registrar. H.323: By the Gatekeeper and/or Gateway. MGCP: By the Call Agent (also called the Media Gateway Controller). SCCP: By the Call Manager.
In a regular phone network and in H.323, the Security Gateway identifies a user based on the telephone number or IP address. In other VoIP networks, the Security Gateway identifies a user in other ways, such as by email address or by URL. The phone makes itself known in the network by registering on an entity that is responsible for mapping each user identity to an IP address. The endpoints are then able to make calls. When making a VoIP call, the endpoint making the call first uses control signals to contact a handover device. This device in turn contacts the destination endpoint, either directly or through another handover device. After the call setup phase, the RTP/RTCP media always passes from endpoint to endpoint.
Page 113
The following diagram illustrates a conversation that VoIP terminal A initiates with VoIP Terminal B using handover. The handover device manages a group of VoIP phones (endpoints) including endpoints A and B. Figure 10-43
VoIP Handover
The following is a typical VoIP Handover workflow: 1. Endpoint A sends control signals to the handover device. 2. The handover device and the endpoints agree on which ports to use to communicate, depending on the protocol and the topology. 3. The handover device routes the control signal to endpoint B. 4. The handover device provides A with the IP address and the destination port of B. 5. A sends the media directly to and from endpoint to endpoint.
For example, if A and B are in the VoIP domain of the handover device C, the Security Gateway ensures that A sends its media streams only to B by verifying that the address of B (which in step 3 the handover device C provided to A) is in the VoIP domain. This process prevents unwanted callers from getting through the firewall. Figure 10-44
VoIP Security
Page 115
VoIP Logging
VoIP Logging
The Security Gateway provides detailed, protocol-specific logs for VoIP traffic. If VoIP logging is disabled, then only standard logging takes place, showing the source, destination and protocol information. SIP, H.323, MGCP and SCCP events are logged in SmartView Tracker. There is also a predefined SmartView Tracker VoIP log query. To enable VoIP logging: From the Global Properties > Log and Alert page, select the Log VoIP connection option. The following VoIP log fields are displayed: Reg. IP-phones: Call registration events. For SIP and MGCP events, this field shows the URL, for example, example@checkpoint.com. For H.323 events, this field shows the phone number, for example, 123456#7. Source IP Phone and Destination IP Phone: Call setup events. Media Type: Type of media (audio, video, instant messaging, applications or unknown) flowing between the source and destination IP Phones. Information: Call and security information, for example, the port used, commands used and illegal direction and setup messages. For MGCP events, the commands are shown.
Protocol-Specific Security
The following sections describe the specific security requirements of the supported VoIP protocols.
The Proxy and the Registrar are handover devices. Handover devices are defined in SmartDashboard as host nodes that manage a VoIP domain. To limit handover locations, it is recommended to define a VoIP domain. A VoIP domain is typically a network or a group of networks. If the handover devices have the same IP address, only one VoIP domain needs to be defined, otherwise, a VoIP domain must be defined for each device.
Page 116
Protocol-Specific Security
In order to allow SIP conversations, you must create rules that permit SIP control signals in the Security Gateway. There is no need to define a media rule that specifies which ports to open and which endpoints that can talk because the Security Gateway derives this information from the Signaling. Given a particular VoIP Signaling rule, the firewall automatically opens ports for the endpoint-to-endpoint RTP/RTCP media stream.
SIP can be configured using the standard, dynamic and nonstandard ports.
Yes Yes
The Proxy is any SIP handover device (Proxy and/or Registrar). In Peer-to-Peer connections topologies both Signaling and media pass from endpoint to endpoint. If there is more than one handover device, Signaling passes through one or more Proxies or Registrars. Once the call has been set up, the media passes peer to peer.
Page 117
Protocol-Specific Security
The SmartDashboard configuration depends on the topology. See also Configuring SIP-Based VoIP (on page 121). Figure 10-45
H.323 - Direct Endpoint-to-Endpoint Communication
Figure 10-46
Protocol-Specific Security
The Security Gateway validates the expected usage of the SIP protocol, for example, if an end of call message is sent immediately after the start of the call, the call is denied because this behavior is characteristic of a DoS attack. Application layer verification includes: Checking for binaries and illegal characters in the packets. Enforcing RFC header fields. Restricting the length of header fields. Removing unknown media types.
Maximum allowed retransmissions: Defines the maximum number of allowed transmissions. 2. Select SIP Custom Properties. The following options are available: Block SIP early media: Blocks SIP calls that use the early media mechanism. Block SIP proxy failover: Blocks SIP calls that switch SIP proxies during the call. Block SIP calls that use two different voice connections (RTP) for incoming audio and outgoing audio: Applies to SIP implementations that use two different RTP connections to transfer voice and/or video information between two peers. If your implementation does not use this scheme, select this option to ensure that the firewall allows only one of these connections. Block calls using a proxy or a redirect server: Prevents calls from being made using an SIP server. When selected, only endpoint-to-endpoint calls are permitted. The additional security obtained by configuring VoIP domains in the Security Rule Base is only possible for calls using a proxy or a redirect server. SIP user suffix length: Defines the user suffix length, for example, the extension number.
Default proxy registration expiration time period: Determines the period of time the firewall holds registration information from clients in its database if a timeout is not present in the registration related messages. The time period should be greater than or equal to the registration time period of the client or the proxy. If the client does not send a user registration message, the registration information is deleted after the defined time period. 3. Select SIP Filtering. The following options are available: Block SIP-based video: Blocks all applications that use SIP to carry video, which includes the video components of MSN Messenger (when configured to use SIP). The default is not to block. Block SIP-based audio: Blocks all applications that use SIP to carry audio, which includes the audio components of MSN Messenger (when configured to use SIP). The default is not to block. Block SIP-based Instant Messaging: Blocks all applications that use SIP for instant messaging. The default is to block. To selectively block applications provided by MSN Messenger, select Instant Messengers > MSN over SIP. To block peer-to-peer applications that allow Instant Messaging, select Application Intelligence > Peer to Peer. Block Push to talk over cellular: Blocks Nokia's proprietary Push to talk messages.
Page 119
Protocol-Specific Security
Drop unknown SIP messages: Drops SIP messages that the firewall does not recognize. This option is enabled by default. If disabled, the firewall accepts unrecognized messages, but only if they conform to the SIP RFC (i.e., they are properly formatted and contain the mandatory CALL-ID, FROM and TO fields).
SIP Services
The following predefined SIP services are available: sip and sip-tcp: Used to enforce handover. Use a VoIP domain in the source or destination of the rule together with the sip service. sip_any and sip-tcp_any: Used if not enforcing handover. Do not place a VoIP domain in the source or destination of the rule. Instead, use Any or a network object, together with the sip_any or sip-tcp_any service. If a VoIP domain is used with the sip_any or sip-tcp_any service, it is equivalent to the sip service.
For VoIP equipment that uses SIP TCP, use the sip-tcp and sip-tcp_any services. When it uses UDP, use the sip and sip_any services. Note - The services sip and sip_any cannot be used in the same rule because they contradict each other. The same is true for sip-tcp and sip-tcp_any. When these services are employed, registration messages are tracked and a database is maintained that includes the details of the IP phones and the users. If an incoming call is made to a Hide NATed address, the Security Gateway verifies that the user exists in the sip registration database before allowing the call, which can prevent DoS attacks. To view a list of the online IP phones: Run the fw tab -t sip_registration -f command.
Page 120
Protocol-Specific Security
ClusterXL Administration Guide (http://supportcontent.checkpoint.com/documentation_download?ID=12265). The fw_sip_allow_mcast (true, false) property allows or drops multicast RTP traffic. The default value of this property is false. This is a per gateway property. To change the value, run the fw ctl set int fw_sip_allow_mcast command.
2. Define Hide NAT (or Static NAT) for the phones in the internal network by editing the network object for Net_A. 3. In the NAT tab, select Add Automatic Address Translation Rules and then the Translation method (Hide or Static). 4. Select Application Intelligence > VoIP > SIP to configure IPS options. See also IPS Application Intelligence for SIP (on page 119) or the online help. 5. Install the security policy: Policy > Install.
Page 121
Protocol-Specific Security
To enable bidirectional calls between SIP phones in both an internal and an external network (Net_A and Net_B), and to define NAT for the internal phones:
1. Define the network objects (nodes or networks) for the IP Phones that are managed by the handover device (SIP Proxy or Registrar), permitted to make calls and whose calls are tracked by the Security Gateway. 2. Define the network object for the handover device (SIP_Proxy). 3. Define the VoIP domain object by right-clicking the Network Objects tree and selecting New > VoIP Domains > VoIP Domain SIP Proxy. The following table provides a list of VoIP domain definitions. If the Proxy and Registrar (SIP_Proxy) are on one machine with a single IP address, define only one VoIP domain. If they have different IP addresses, define a VoIP domain for each IP address. The definition of the VoIP domain depends on whether or not you want to enforce handover locations for phones in the external network. For phones in the internal network, handover should always be enforced. Table 10-17 VoIP Domain Definitions VoIP Domain Definition With Handover No Handover for External Phones VoIP_Domain_A Net_A
VoIP Gateway installed at SIP_Proxy 4. Define one of the following SIP rules:
SIP_Proxy
a) For full handover enforcement, define the following rule: Table 10-18 Bidirectional SIP Rule - Handover Enforced Source VoIP_Domain Net_A Destination Net_A VoIP_Domain Service Action Comment Bidirectional calls. Handover enforced.
b) If you do not want to enforce handover for the external phones (in Net_B), define the following rules:
Page 122
Protocol-Specific Security
Table 10-19 Bidirectional SIP Rule - Handover Not Enforced Source Net_A Destination Any Service sip_any or sip-tcp_any sip or sip-tcp Action Accept Comment Outgoing calls. No handover enforced. Incoming calls. Handover enforced.
Any
VoIP_Domain_A
Accept
For additional information on SIP services, see SIP Services (on page 120). 5. Define Hide NAT (or Static NAT) for the phones in the internal network by editing the network object for Net_A. In the NAT tab, select Add Automatic Address Translation Rules, and then the Translation method (Hide or Static). 6. Select Application Intelligence > VoIP > SIP to configure IPS options. See also IPS Application Intelligence for SIP (on page 119) or the online help. 7. Install the security policy: Policy > Install.
To enable bidirectional calls between phones in both the internal and the external networks (Net_A and Net_B) and to define NAT for the internal phones and the internal Proxy (GW_A):
1. Define the network objects (nodes or networks) for the phones that are permitted to make calls and whose calls are tracked by the Security Gateway. 2. Define the network object for the Proxy objects (Proxy_A and Proxy_B). 3. Define Security Rule Base rules with a VoIP domain to enforce handover by right-clicking the Network Objects tree and selecting New > VoIP Domains > VoIP Domain SIP Proxy. 4. Define the following two VoIP domains: Table 10-20 Defining VoIP Domains Name Related endpoints domain VoIP_Domain_A Group containing Net_A and Net-B Proxy_A VoIP_Domain_B Group containing Net_A and Net_B Proxy_B
VoIP installed at
Page 123
Protocol-Specific Security
a) For full handover enforcement, define the following rule: Table 10-21 External SIP Handover Enforced Source VoIP_Domain_A VoIP_Domain_B Destination VoIP_Domain_B VoIP_Domain_A Service sip or sip-tcp Action Accept Comment Bidirectional calls. Handover enforced.
b) If you do not want to enforce handover for the external phones (in Net_B), define the following rules: Table 10-22 External SIP Handover Not Enforced Source VoIP_Domain_A Destination Any Service sip_any or sip-tcp_any sip or sip-tcp Action Accept Comment Outgoing calls. No handover enforced. Incoming calls. Handover enforced.
Any
VoIP_Domain_A
Accept
6.
7. 8. 9.
For additional information on SIP services, refer to SIP Services (on page 120). Define Hide NAT (or Static NAT) for the phones in the internal network by editing the network object for the internal network (Net_A). In the NAT tab, select Add Automatic Address Translation Rules and then the Translation method (Hide or Static). Define Static NAT for the Proxy in the internal network by repeating step 6 for the Proxy object (Proxy_A). Select Application Intelligence > VoIP > SIP to configure IPS options. See also IPS Application Intelligence for SIP (on page 119) or the online help. Install the security policy: Policy > Install.
To enable bidirectional calls between phones both in an internal and an external network (Net_A and Net_B) and to define NAT for the internal phones and the Proxy in the DMZ (Proxy_DMZ):
1. Define the network objects (nodes or networks) for the phones that are permitted to make calls and whose calls are tracked by the Security Gateway. 2. Define the network object for the Proxy (Proxy_DMZ). 3. Define Security Rule Base rules with or without a VoIP domain to enforce handover by right-clicking the Network Objects tree and selecting New > VoIP Domains > VoIP Domain SIP Proxy.
Page 124
Protocol-Specific Security
Table 10-23 VoIP by Domain VoIP Domain Definition Name Related endpoints domain VoIP installed at With Handover VoIP_Domain Group containing Net_A and Net_B
Proxy_DMZ
4. Define the rules for full handover enforcement. Table 10-24 Handover Enforced by Domain Source VoIP_Domain Net_A Net_B Destination Net_A Net_B VoIP_Domain Service sip or siptcp Action Accept Comment Bidirectional calls. Handover enforced.
For additional information on SIP services, refer to SIP Services (on page 120). 5. Define Hide NAT (or Static NAT) for the phones in the internal network by doing the following: a) To edit the network object for Net_A, In the NAT tab, select Add Automatic Address Translation Rules and then the Translation method (Hide or Static). b) If using Hide NAT, you must select the Hide behind IP address option and type the IP address of the Hiding address of the phones in the internal network. c) If using Hide NAT, you must add a Node object with the Hide NAT IP address to the Destination of the rule(s) defined in step 4. 6. Define Static NAT for the Proxy in the DMZ by creating a node object for the Static address of the Proxy (for example, Proxy_DMZ_NATed) and by adding the following manual NAT rules: Table 10-25 DMZ Rule in VoIP Original Source Proxy_DMZ Destination Net_B Service *Any Source Proxy_DMZ _NATed: Static = Translated Destination = Service = Outgoing calls Comment
Net_B
Proxy_DMZ_NATed *Any
Proxy_DMZ: Static
Incoming calls
7. As for all manual NAT rules, configure proxy-arps. To associate the translated IP address with the MAC address of the Check Point gateway interface that is on the same network as the translated addresses, use the arp command in Unix or the local.arp file in Windows. The fw ctl arp command displays the ARP proxy table on Security Gateways that run on Windows. On Unix, use the arp -a command. 8. Select Application Intelligence > VoIP > SIP to configure IPS options. See IPS Application Intelligence for SIP (on page 119) or the online help. 9. Install the security policy: Policy > Install.
Configuring SIP-T Support To configure support for RFC 3372 Session Initiation Protocol for Telephones (SIP-T):
1. Add the $FWDIR/lib/user.def line on the Security Management server:
Page 125
Protocol-Specific Security
sipt_hosts = { < first_ip, second_ip> , < first_ip, second_ip> , .... ....,< first_ip, second_ip> } ; where first_ip and second_ip are the IP addresses between which (bi-directional) SIP-T are allowed. For example, to allow SIP-T between 192.1.1.1 and 192.1.1.2, and between 192.1.1.1 and 192.1.1.3 add the following line: sipt_hosts = { < 192.1.1.1, 192.1.1.2> , < 192.1.1.1, 192.1.1.3> } ; If the file does not exist, create it. 2. Save the file. 3. Install the security policy: Policy > Install.
Troubleshooting SIP To view a list of all online IP phones registered on a Security Gateway:
1. Run the fw tab -t sip_registration -f command. The output of this command is a list in the user name; IP address format.
The Gatekeeper and Gateway are handover devices. Handover devices are defined in SmartDashboard as host nodes which manage a VoIP domain. In order to limit handover locations, define a VoIP domain. A VoIP domain is typically a network or group of networks. If the handover devices have the same IP address, only one VoIP domain need be defined. If these devices have different IP addresses, a VoIP domain must be defined for each one.
Page 126
Protocol-Specific Security
To allow H.323 conversations, you need only create rules to allow the H.323 control signals through the Security Gateway. There is no need to define a rule for the media that specifies which ports to open and which endpoints will talk. The Security Gateway derives this information from the Signaling. Given a particular VoIP Signaling rule, the firewall automatically opens ports for the endpoint-to-endpoint RTP/RTCP media stream.
Yes
Yes
Yes
Endpoint to Endpoint: The IP Phones communicate directly, without a Gatekeeper or a Gateway. NAT (both hide and static mode) can be configured for the phones on the internal side of the Security Gateway. No incoming calls can be made when Hide NAT is configured for the internal phones.
H.323 - Direct Endpoint-to-Endpoint Communication
Figure 10-51
Gatekeeper/Gateway in External Network: The IP Phones use the services of a Gatekeeper on the external side of the Security Gateway. This topology enables using the services of a Gatekeeper that is
Page 127
Protocol-Specific Security
maintained by another organization. It is possible to configure Hide NAT (or Static NAT or no NAT) for the phones on the internal side of the Security Gateway. Figure 10-52
Gatekeeper In External Network
Gatekeeper/Gateway in the DMZ: The same Gatekeeper/Gateway controls both endpoint domains. This topology makes it possible to provide Gatekeeper/Gateway services to other organizations. Static NAT (or no NAT) can be configured for the Gatekeeper/Gateway. Hide NAT (or Static or no NAT) can be configured for the phones on the internal side of the Security Gateway.
H.323: Gatekeeper in the DMZ
Figure 10-53
Page 128
Protocol-Specific Security
Gatekeeper/Gateway to Gatekeeper/Gateway : Each Gatekeeper/Gateway controls a separate endpoint domain. Static NAT can be configured for one of the Gatekeepers/Gateways. For the phones, Hide NAT (or Static NAT) can be configured for the phones on the internal or the external side of the Security Gateway (but not both).
H.323: Gatekeeper-to-Gatekeeper
Figure 10-54
The Security Gateway supports Fast Connect, an advanced H.323 capability that ensures that audio is available as soon as the phone is answered. This feature is active by default, and is always available.
Page 129
Protocol-Specific Security
Rule Base. This setting applies only to connections that start with RAS (that is allowed and inspected by the H323_ras service). Drop H.323 calls that do not start with a SETUP message: Ensures that if this option is selected, all H.323/Q.931 connections that do not start with a SETUP message are dropped. T120 timeout: Determines how long a dynamically opened T120 connection can be idle. After this time, the connection is deleted. The default timeout is 3600 seconds.
As an H.323 call is processed by a Gatekeeper, these protocols are used in sequence and then the media passes. To end a call, the signaling protocols are used in reverse order. The protocol sequence for a Gateway is the same, except that an endpoint does not use RAS when it connects to the Gateway.
Routing Modes
H.323 routing modes define which control protocols should pass between the Gatekeepers or Gateways, and which between the endpoints. A Security Gateway can be configured to allow one or more of the routing modes. At least one of the routing modes must be selected. If the Security Gateway is configured to allow more than one routing mode, the Gatekeeper/Gateway is free to decide which routing mode to use. Figure 10-55
Gatekeeper and Gateway Routing Modes
The following routing modes are illustrated in the above illustration: Direct mode is for Gatekeepers only, and not for Gateways. Only the RAS signals pass through the Gatekeeper. All other Signaling (Q.931 and H.245), as well as the RTP/RTCP media, passes directly endpoint to endpoint. Call Setup (Q.931) mode allows RAS (used only by Gatekeepers) and Q.931 to pass through the Gatekeeper/Gateway. H.245 and the RTP/RTCP media pass endpoint to endpoint.
Page 130
Protocol-Specific Security
Call Setup (Q.931) and Call Control (H.245) mode allows RAS (for a Gatekeeper only), Q.931 and H.245 to pass through the Gatekeeper/Gateway. Only the RTP/RTCP media passes endpoint to endpoint.
H.323 Services
The following predefined services are available for use in H.323 rules. They can be used to limit the protocols that are permitted during each stage of the H.323 call. Separate rules can be defined for the different protocols: Note - The services H323 and H323_any cannot be used in the same rule because they contradict each other. Similarly, the services H323_ras and H323_ras_any cannot be used in the same rule. H323_ras_only allows only RAS. Cannot be used to make calls. If this service is used, no Application Intelligence checks (payload inspection or modification) are made. Do not use in the same rule as the H323_ras service. H323_ras allows a RAS port to be opened, followed by a Q.931 port. Q.931 then opens a H.245 port if needed, which in turn opens ports for RTP/RTCP or T.120. Use this service to do NAT on RAS messages. Do not use in the same rule as the H323_ras_only service. H323 allows a Q.931 to be opened (and if needed, a H.245 port,) which in turn opens ports for RTP/RTCP or T.120. Do not use in the same rule as the H323_any service. H323_any is like the H323 service, but also allows the Destination in the rule to be ANY rather than a network object. Only use H323_any if you do not know the VoIP topology, and are not enforcing handover using a VoIP domain. Do not use in the same rule as the H323 service.
For an H.323 Gatekeeper, the VoIP domain corresponds to the zone of that Gatekeeper. A zone is a collection of terminals that are managed by a single Gatekeeper. A zone has one and only one Gatekeeper. If the Gatekeeper and Gateway have different IP addresses, define a VoIP domain for each one. If the Gateway and Gatekeeper are on single machine, and have the same IP address, define only a single VoIP Domain H.323 Gatekeeper object.
Page 131
Protocol-Specific Security
2. To define Hide NAT (or Static NAT) for the phones in the internal network, edit the network object for the internal network (Net_A). In the NAT tab, check Add Automatic Address Translation Rules, and select the Translation method (Hide or Static). 3. Configure the IPS options under Application Intelligence > VoIP > H.323 as required. For details, refer to IPS Application Intelligence Settings ("IPS Application Intelligence for SIP" on page 119) for H.323, or the online help. 4. Install the security policy: Policy > Install.
Page 132
Protocol-Specific Security
VoIP installed at
4. In the Routing Mode tab, define permitted routing modes for the Gatekeepers. For an explanation of the modes, refer to Routing Modes (on page 130). It is important to select at least one option. 5. Now define the rules. To enforce handover, define the following rule with VoIP domains: Table 10-28 VoIP Handover Enforced Source VoIP_Domain_A VoIP_Domain_B Destination VoIP_Domain_B VoIP_Domain_A Service H323_ras Action Accept Comment Bidirectional calls. Handover enforced.
If you do not want to enforce handover, define the following rules: Table 10-29 VoIP Handover Not Enforced Source GK_A Destination GK_B Service H323_ras_ only Action Accept Comment No handover.
Page 133
Protocol-Specific Security
Service H323
Action Accept
Comment No handover.
6.
7. 8.
9. 10.
When rules without a VoIP domain are defined, all connections other than H323_ras must be peer to peer. For an explanation of the H.323 services, refer to H.323 Services (on page 131). To define Hide NAT (or Static NAT) for the phones in the internal network, edit the network object for the internal network (Net_A). In the NAT tab, select Add Automatic Address Translation Rules, and select the Translation method (Hide or Static). To define Static NAT for the Gatekeeper/Gateway in the internal network, repeat step 6 for the Gatekeeper object (GK_A). It is recommended to make the time-out of the H323_ras service equal to or greater than the Gatekeeper registration time-out. Configure the time-outs in the Advanced Properties window of the Service object. Configure the IPS options under Application Intelligence > VoIP > H.323 as required. For details, refer to IPS Application Intelligence Settings for H.323 (on page 129), or the online help. Install the security policy: Policy > Install.
VoIP installed at
Page 134
Protocol-Specific Security
5. In the Routing Mode tab, define permitted routing modes for the Gateways. For an explanation of the modes, refer to Routing Modes (on page 130). It is important to select at least one option. 6. Now define the rules. To enforce handover, define the following rule with VoIP domains: Table 10-31 VoIP Handover Enforced Source VoIP_Domain_A VoIP_Domain_B Destination VoIP_Domain_B VoIP_Domain_A Service H323 Action Accept Comment Bidirectional calls. Handover enforced.
7.
8. 9. 10.
For an explanation of the H.323 services, refer to H.323 Services (on page 131). To define Hide NAT (or Static NAT) for the phones in the internal network, edit the network object for the internal network (Net_A). In the NAT tab, select Add Automatic Address Translation Rules, and select the Translation method (Hide or Static) To define Static NAT for the Gatekeeper/Gateway in the internal network, repeat step 6 for the Gatekeeper/Gateway object (GK_A). Configure the IPS options under Application Intelligence > VoIP > H.323 as required. For details, refer to IPS Application Intelligence Settings for H.323 (on page 129), or the online help. Install the security policy: Policy > Install.
Page 135
Protocol-Specific Security
5. In the Routing Mode tab, define permitted routing modes for the Gatekeeper. For an explanation of the modes, refer to Routing Modes (on page 130). It is important to select at least one option. 6. Now define the rules. To enforce handover, define the following rule with a VoIP domain: Table 10-33 VoIP Handover Enforced Source Net_A Net_B VoIP_Domain If you do not want to enforce handover, define the following rules: Table 10-34 VoIP Handover Not Enforced Source Net_A Net_A Net_B Destination GK_B Net_A Net_B Service H323_ras_only H323 Action Accept Accept Comment No handover. No handover. Destination VoIP_Domain Net_A Service H323_ras H323 Action Accept Comment Bidirectional calls. Handover enforced.
When rules without a VoIP domain are defined, all connections other than RAS connections must be peer to peer. For an explanation of the H.323 services, refer to H.323 Services (on page 131). 7. To define Hide NAT (or Static NAT) for the phones in the internal network: a) Edit the network object for the internal network (Net_A). In the NAT tab, check Add Automatic Address Translation Rules, and select the Translation method (Hide or Static) b) If defining Hide NAT, add a Node object with the Hide NAT IP address to the Destination of the rule(s) defined in step 6. 8. It is recommended to make the time-out of the H323_ras service greater or equal to the Gatekeeper registration time-out. Configure the time-outs in the Advanced Properties window of the Service object. 9. Configure the IPS options under Application Intelligence > VoIP > H.323 as required. For details, refer to IPS Application Intelligence Settings for H.323 (on page 129), or the online help. 10. Install the security policy: Policy > Install.
Page 136
Protocol-Specific Security
VoIP installed at
4. In the Routing Mode tab, define permitted routing modes for the Gateway. For an explanation of the modes, refer to Routing Modes (on page 130). It is important to select at least one option. 5. Now define the rules. To enforce handover, define the following rule with a VoIP domain:
Service H323
Action Accept
Protocol-Specific Security
GK_DMZ
4. In the Routing Mode tab, define permitted routing modes for the Gatekeeper. For an explanation of the modes, refer to Routing Modes (on page 130). It is important to select at least one option. 5. Now define the rules. For full handover enforcement, define the following rule:
Page 138
Protocol-Specific Security
Table 10-37 VoIP Handover Enforced Source VoIP_Domain Net_A Net_B Destination Net_A Net_B VoIP_Domain Service H323_ras Action Accept Comment Bidirectional calls. Handover enforced.
If you do not want to enforce handover for the external phones (in Net_B), define the following rules: Table 10-38 VoIP Handover Not Enforced Source Net_A, Net_B, GK_DMZ Net_A Net_B Destination Net_A, Net_B, GK_DMZ Net_A Net_B H323 Accept No Handover enforced. Service H323_ras_only Action Accept Comment Outgoing calls. No handover enforced.
When rules without a VoIP domain are defined, all connections other than H323_ras are only allowed to be peer to peer. For an explanation of the H.323 services, refer to H.323 Services (on page 131). 6. To define Hide NAT (or Static NAT) for the phones in the internal network: a) Edit the network object for Net_A. In the NAT tab, select Add Automatic Address Translation Rules, and select the Translation method (Hide or Static). b) If using Hide NAT, you must select the Hide behind IP address option, and type the IP address of the Hiding address of the phones in the internal network. c) If using Hide NAT, you must add a Node object with the Hide NAT IP address to the Destination of the rule(s) defined in step 5. 7. To define Static NAT for the Gatekeeper in the DMZ, add manual NAT rules, as follows: a) Create a Node object for the Static address of the Gatekeeper (for example: GK_DMZ_NATed). b) Define the following manual NAT rules: Table 10-39 Manual NAT Original Source GK_DMZ Destination Net_B Service *Any Source GK_DMZ: Static = Translated Destination = Service = Outgoing calls Comment
Net_B
GK_DMZ: Static
Incoming calls
c) As for all manual NAT rules, configure proxy-ARPs. In other words, you must associate the translated IP address with the MAC address of the Check Point Gateway interface that is on the same network as the translated addresses. Use the arp command in Unix or the local.arp file in Windows. The command fw ctl arp displays the ARP proxy table on Security Gateways that run on Windows. On Unix, use the arp -a command. 8. It is recommended to make the time-out of the H.323_ras service greater than or equal to the Gatekeeper registration time-out. Configure the time-outs in the Advanced Properties window of the Service object. 9. Configure the IPS options under Application Intelligence > VoIP > H.323 as required. For details, refer to IPS Application Intelligence Settings for H.323 (on page 129), or the online help. 10. Install the security policy: Policy > Install.
Page 139
Protocol-Specific Security
GK_DMZ
4. In the Routing Mode tab, define permitted routing modes for the Gateway. For an explanation of the modes, refer to Routing Modes (on page 130). It is important to select at least one option. 5. Now define the rules for full handover enforcement: Source VoIP_Domain Net_A Net_B Destination Net_A Net_B VoIP_Domain Service H323 Action Accept Comment Bidirectional calls. Handover enforced.
For an explanation of the H.323 services, refer to H.323 Services (on page 131). 6. To define Hide NAT (or Static NAT) for the phones in the internal network: a) Edit the network object for Net_A. In the NAT tab, check Add Automatic Address Translation Rules, and select the Translation method (Hide or Static). b) If using Hide NAT, you must select the Hide behind IP address option, and type the IP address of the Hiding address of the phones in the internal network. c) If using Hide NAT, you must add a Node object with the Hide NAT IP address to the Destination of the rule(s) defined in step 5. 7. To define Static NAT for the Gateway in the DMZ, add manual NAT rules, as follows: a) Create a Node object for the Static address of the Gateway (for example: GW_DMZ_NATed). b) Define the following manual NAT rules: Table 10-41 Manual NAT Original Source GW_DMZ Destination Net_B Service *Any Source GW_DMZ: Static = Translated Destination = Service = Outgoing calls Incoming calls Comment
Net_B
GW_DMZ_NATed
*Any
GW_DMZ: Static
Page 140
Protocol-Specific Security
c) As for all manual NAT rules, configure proxy-arps. In other words, you must associate the translated IP address with the MAC address of the Check Point Gateway interface that is on the same network as the translated addresses. Use the arp command in Unix or the local.arp file in Windows. The command fw ctl arp displays the ARP proxy table on Security Gateways that run on Windows. On Unix, use the arp -a command. 8. Configure the IPS options under Application Intelligence > VoIP > H.323 as required. For details, refer to IPS Application Intelligence Settings for H.323 (on page 129), or the online help. 9. Install the security policy.
Page 141
Protocol-Specific Security
The MGCP assumes that the call control devices, or Call Agents, will synchronize with each other to send commands to devices under their control called Media Gateways. Call Agents can also connect directly to IP Phones. The Media Gateways or IP Phones are expected to execute commands sent by the Call Agents. The following illustration shows the MGCP elements and a simplified call control process. Figure 10-62
MGCP Elements
The Call Agent and Media Gateways are defined in SmartDashboard, usually as Node objects. To allow MGCP conversations you need only create rules to allow the MGCP control signals through the Security Gateway. There is no need to define a rule for the media that specifies which ports to open and which endpoints will talk. a Security Gateway derives this information from the Signaling. Given a particular VoIP Signaling rule, the firewall automatically opens ports for the endpoint-to-endpoint RTP/RTCP media stream.
Media Gateway
A Media Gateway is a network device that: Provides conversion between the audio signals carried on telephone circuits and data packets carried over the Internet or over other packet networks. Sends notification to the call agent about endpoint events. Executes commands from the call agents.
Media Gateways normally support features such as conference calls, 3-way brokering and supervisor inspection. All of these features are supported by the predefined Security Gateway MGCP services (MGCPCA and MGCP-MG).
MGCP IP Phones
An MGCP IP Phone is a network device that: Provides conversion between the audio signals carried over the Internet or over other packet networks. Sends notification to the call agent about its events. Executes commands from the call agents.
Page 142
Protocol-Specific Security
MCGP IP Phones normally support features such as conference calls, three-way brokering, and supervisor inspection. All of these features are supported by the predefined Security Gateway MGCP services (MGCPCA and MGCP-MG).
Blocked/Accepted Commands
There are nine predefined MGCP commands. Some commands are made by the Call Agent, and others by the Gateway, as shown in the following table. It is possible to allow or disallow any command as dictated by the security needs. Table 10-42 MGCP commands Call Agent Commands EndpointConfiguration (EPCF) NotificationRequest (RQNT) CreateConnection (CRCX) ModifyConnection (MDCX) DeleteConnection (DLCX) AuditEndpoint (AUEP) AuditConnection (AUCX) In addition, it is possible to define additional proprietary commands, as well as whether to allow or block those commands. By default, all undefined commands are blocked. The firewall verifies that the new commands are RFC compliant. MGCP packets contain an optional SDP header. This header contains information such as the destination port number, the destination IP address and the media type (audio or video). The predefined MGCP commands MDCX and CRCX have an SDP header. When defining an MGCP command, it is possible to specify whether or not the command contains an SDP header. The firewall knows how to parse the header and check it has the correct syntax. If the destination address and port in the header are allowed, The firewall allows the media connection through the Gateway. Gateway Commands Notify (NTFY) DeleteConnection (DLXC) RestartInProgress (RSIP)
Page 143
Protocol-Specific Security
Yes Yes
The "Call Agent" is any MGCP handover device. Where there is one or more handover devices, the signaling passes through one or more Call Agents. Once the call has been set up, the media can pass peer to peer. The SmartDashboard configuration depends on the topology, as described in Configuring MGCP-Based VoIP (on page 145) which includes diagrams showing the most widely used deployment topologies. Figure 10-63
MGCP Call Agent in External Network
Page 144
Protocol-Specific Security
4. Now define the rules. With full handover enforcement, define the following rule:
Page 145
Protocol-Specific Security
Table 10-45 VoIP Handover Enforced Source VoIP_Domain Net_A Destination Net_A VoIP_Domain Service mgcp_CA or mgcp_MG or mgcp_dynamic_ports Action Accept
The services are: mgcp_CA is Call Agent service. It uses port 2727. mgcp_MG is the Media Gateway service. It uses port 2427.
mgcp_dynamic_ports - is the MGCP service and uses ports that are not predefined. For example, ports that were identified in the NotifiedEntity field in previous MGCP packets. 5. To define Hide NAT (or Static NAT) for the phones in the internal network, edit the network object for Net_A. In the NAT tab, check Add Automatic Address Translation Rules, and select the Translation method (Hide or Static) 6. Configure IPS options under Application Intelligence > VoIP > MGCP as required. 7. Install the security policy: Policy > Install.
SCCP Devices
SCCP has a centralized call-control architecture. The CallManager manages SCCP clients (VoIP endpoints), which can be IP Phones or Cisco ATA analog phone adapters. The CallManager controls all the features of the endpoints. It requests information, such as the station capabilities, and sends information, such as the button template and the date/time, to the VoIP endpoints. The CallManagers are defined in SmartDashboard, usually as Node objects. The networks containing directly-managed IP Phones are also defined in SmartDashboard. There is normally no need to define network objects for individual phones. Cisco ATA devices that are managed by a CallManager must be defined in SmartDashboard, but the connected analog phones are not defined. To allow SCCP conversations, you need only create rules to allow the SCCP control signals through the Security Gateway. There is no need to define a rule for the media that specifies which ports to open and which endpoints will talk. a Security Gateway derives this information from the Signaling. Given a particular VoIP Signaling rule, the firewall automatically opens ports for the endpoint-to-endpoint RTP/RTCP media stream.
Page 146
Protocol-Specific Security
Page 147
Protocol-Specific Security
The rules in following table allow any telephone managed by ATA_Int and ATA_Ext to make calls to each other. Table 10-46 SCCP rules for a CallManager in the DMZ Source ATA_Int ATA_Ext VoIP_Call_Manager Destination VoIP_Call_Manager Service SCCP Action Accept
ATA_Int ATA_Ext
SCCP
Accept
VoIP_Call_Manager is the VoIP domain object with endpoint domain that includes both ATA_Int and ATA_Ext.
Page 148
Protocol-Specific Security
The rules in following table allow any telephone managed by ATA_Int and ATA_Ext to make calls to each other. Each rule allows calls in one direction. Table 10-47 SCCP Rules for a CallManager in the internal Network Source VoIP_Call_Manager ATA_Ext Destination ATA_Ext VoIP_Call_Manager Service SCCP SCCP Action Accept Accept Comment Outgoing calls Incoming calls
VoIP_Call_Manager is the VoIP domain object with an endpoint domain that includes both ATA_Int and ATA_Ext. Add a Cisco ATA device or IP Phone objects to a Group object, and then use it as the Related endpoints domain. In the VoIP installed at field, put the CallManager object.
Page 149
Protocol-Specific Security
The first rule in the following table allows any telephone managed by ATA_Int and in the Skinny_LAN to call any telephone managed by ATA_Ext. The second rule allows calls in the opposite direction. In this case, no VoIP domain is needed, because the CallManager is in the external network. Make sure that, in the Security Gateway object Topology page, the interface that faces the Internet is defined as External. Table 10-48 SCCP rules for a CallManager in the internal network Source ATA_Int Skinny_LAN Call_Manager Destination Call_Manager Service Action SCCP Accept Comment Outgoing calls
ATA_Int Skinny_LAN
SCCP
Accept
Incoming calls
ATA_Int Skinny_LAN
SCCP
Accept
Incoming calls
VoIP_Call_Manager is the VoIP domain object with an endpoint domain that includes both ATA_Int and Skinny_LAN. Create the VoIP domain object as shown in SCCP Rules for a CallManager in an External Network (on page 150). Add a Cisco ATA device or IP Phone objects to a Group object, and use it as the Related endpoints domain. In the VoIP installed at field, put the CallManager object.
Page 150
Chapter 11
Securing Instant Messaging Applications
In This Chapter The Need to Secure Instant Messenger Applications Introduction to Instant Messenger Security Understanding Instant Messenger Security NAT Support for MSN Messenger over SIP NAT Support for MSN Messenger over MSNMS Logging Instant Messenger Applications Configuring SIP-based Instant Messengers Configuring MSN Messenger over MSNMS Configuring Skype, Yahoo, ICQ and More 151 151 152 152 152 153 153 154 154
Page 151
Firewall and IPS secure MSN Messenger over SIP topologies. MSN Messenger over SIP requires the use of a SIP proxy, and does not support endpoint -to-endpoint calls.
Some peer-to-peer applications also have Instant Messenger capabilities, which can be blocked or allowed. For details, see the HTML pages and online help for the IPS Application Intelligence > Peer to Peer category.
Internal > External (outbound traffic) External > Internal (inbound traffic) Internal > Internal (internal traffic)
Yes
No
Yes
No
Yes
No
Yes
Yes
No
Yes
Yes
Yes
Yes
Yes
Call registration Instant message Audio Video Application sharing and Whiteboard (MSN Messenger only) File transfer (MSN Messenger only) Remote Assistant (MSN Messenger only)
media type
File_Transfer
media type
Remote_Assistance
The ports used when setting up and maintaining an Instant Messenger call can be either fixed or dynamically assigned. They depend on the call setup sequence, which varies with the event and application. The Service and Source Port fields of the SmartView Tracker log record show the port numbers used.
To selectively block SIP-based Instant Messenger applications (while allowing the core instant Messaging capabilities):
1. Create a network group object that contains all clients that are allowed to work with the SIP proxy (call it allowed_phones, for example). 2. Create a VoIP domain object for the SIP proxy (call it SIP_domain, for example). 3. Define the rule that includes all the services that you wish to allow. The rule shown below includes all the relevant services, and allows calls in both directions.
Page 153
Table 11-52 Example rule allowing SIP-based Instant Messengers Source allowed_phones SIP_domain Destination SIP_domain allowed_phones Service sip sip_dynamic_ports T.120 MSN_Messenger_File_Transfer The relevant services are: sip allows the use of a proxy server and enforces handover via a VoIP Domain. See SIP Services (on page 120). sip_dynamic_ports is required for all SIP-based instant messaging applications. T.120 is needed for application sharing and whiteboard applications. Action Accept Action Log
MSN_Messenger_File_Transfer is used for the MSN Messenger File Transfer application. 4. If required, configure Static and/or Hide NAT for MSN Messenger, taking into account the limitations described in NAT Support for MSN Messenger over SIP (on page 152). 5. Configure the IPS SIP options in the following protections: Application Intelligence > VoIP > SIP Filtering Application Intelligence > VoIP > SIP Protections Application Intelligence > VoIP > SIP Custom Properties Application Intelligence > Instant Messengers > MSN Messenger over SIP
MSN Messenger - General Settings 4. To block MSN messenger communication that uses HTTP, open the IPS > By Protocol > HTTP Protocol Inspection > Header Rejection protection. In the Protection Settings window, select all headers from the list that contain Msn Messenger and MSN Web Messenger.
Page 154
Chapter 12
Microsoft Networking Services Security
In This Chapter Securing Microsoft Networking Services (CIFS) Restricting Access to Servers and Shares (CIFS Resource) 155 155
Page 155
3. Add a new rule. Under Service, add either nbsession or Microsoft-DS, together with the configured Resource. Important - Do not delete or change the protocol type of the service objects that perform content inspection. If the service is altered in this way, the protection will not work. 4. Install the security policy: Policy > Install.
Page 156
Chapter 13
FTP Security
In This Chapter Introduction to FTP Content Security FTP Enforcement by the Firewall Kernel FTP Enforcement by the FTP Security Server Configuring Restricted Access to Specific Directories 157 157 157 158
Page 157
A Security Gateway enables control over the desired mode of FTP traffic, both for passive FTP, where the client initiates the data connection, and for active FTP, where the server initiates the data connection. Typically, the firewall should block connections initiated from outside the protected domain.
To restrict access:
1. Create an FTP Resource to allow file downloads (from Manage > Resources, click New > FTP). In the General tab, name the resource (for example, Download), and select a Tracking Option (such as Log). In the Match tab, type the allowed directory path using wildcards, for example, * to allow any directory and filename. Under Methods, select GET. 2. Create an FTP Resource to allow file uploads. In the General tab, name the resource (for example, Upload), and select a Tracking Option. In the Match tab, type the allowed directory path and filename, using wildcards. For example /uploads/*. Under Methods, select PUT. Define one rule to allow file uploads, and another rule to allow file downloads. For a LAN called Alaska_LAN and an FTP server in the DMZ called Alaska.DMZ.ftp, the rules should resemble those listed below.
FTP Security
Page 158
Table 13-53 Example Rules for FTP Upload and Download Source Alaska_ Lan Destination Service Action Accept Track Log Install On *Policy Targets Time Any Comment ftp upload to /uploads/* ftp download from*
Alaska.DMZ.ft ftp->Upload p
Alaska_ Lan
Alaska.DMZ.ft ftp->Upload p
Accept
Log
*Policy Targets
Any
FTP Security
Page 159
Chapter 14
Content Security
In This Chapter Introduction to Content Security Configuring Content Security Advanced CVP Configuration: CVP Chaining and Load Sharing 160 165 168
For details, see the list of OPSEC Content Security solutions (http://www.opsec.com/solutions/sec_content_security.html). Content security applications, like virus scanners, inspect the content of individual packets for specific services. The Content Vectoring Protocol (CVP) is an API specification developed by Check Point used for integration with Anti-Virus servers. This API defines an asynchronous interface to server applications that validate file content. An important feature of CVP is scanning files for viruses or harmful applets as they pass through firewalls. CVP defines a client/server relationship that enables different Security Gateways to share a common content validation server. In Service Provider environments, it can be offered as an add-on to Internet services, where it may be used for parental restriction of child Web surfing or on behalf of businesses that have an inherent distrust of Internet content.
Security Servers
Security servers are Check Point processes that are integrated into the firewall. They are user mode processes that provide content security for: HTTP FTP SMTP
There is also a generic TCP Security server. Security servers employ many ways of enforcing Content Security, including, checking whether the connections for these protocols are well formed, stripping script tags for HTTP, email address translation for SMTP, and file name matching for FTP. In addition to Content Security, Security servers also perform authentication. For additional information on the authentication functions of the Security servers, refer to Authentication (on page 27).
Page 160
The source IP address that appears to the destination server is the IP address of the client that originally opened the connection. The connection leaves the Security server with the source IP address of the Security Gateway, and the outbound kernel performs NAT so that the source IP address is that of the original client.
Content Security
Page 161
Performing scanning at the network perimeter is both safer and more efficient than performing the scanning at the desktop or on the application servers. Figure 14-69
OPSEC Server Integration
Content Security
Page 162
1. HTTP client to HTTP server (request) 2. HTTP server to HTTP client (response) The data that needs to be checked is carried in the response that comes from the Web server. Therefore, when a CVP server is used, the response is always checked. In that case, the connection request/response process is: 1. HTTP client to HTTP server (request) 2. HTTP server to CVP server (response) 3. CVP server to HTTP client (response) Normally, only HTTP responses, which come from the Web server, are sent to the CVP server for checking. However, you also may wish to protect against undesirable content in the HTTP request, for example, when inspecting peer-to-peer connections. In this case, the connection request/response process is: 1. 2. 3. 4. HTTP client to CVP server (request) CVP server to HTTP server (request) HTTP server to CVP server (response) CVP server to HTTP client (response)
The HTTP Security server can be configured to send HTTP headers to the CVP server, as well as the HTTP message data.
Content Security
Page 163
The relevant rule for the connection specifies a resource that includes Content Vectoring Protocol (CVP) for Anti-Virus checking. 1. The FTP client establishes a connection via port 21 to the FTP server. 2. The Inspection Module monitors port 21 for GET and PUT commands, and determines that the CVP server must be invoked. 3. When the client initiates data transfer over port 20, the gateway diverts the connection into the FTP Security server. 4. The FTP Security server sends the file to be inspected to the CVP server. 5. The CVP server scans the FTP files and returns a Validation Result message, notifying the FTP Security server of the result of the scan. 6. The CVP server returns a clean version of the file to the FTP Security server. 7. Based on the Validation Result message, the FTP Security server determines whether to transfer the file, and takes the action defined for the resource, either allowing or disallowing the file transfer. 8. If allowed, the FTP Security server relays the FTP file on to the FTP server.
Content Security
Page 164
Using a Resource turns on either kernel inspection or the Security servers, depending on what the resource is used for. For instance, a rule can be created that will drop the connection and generate an alert if there are GETs or PUTs in an FTP transfer or if a specifically named file is part of the transfer. Another rule can drop email addresses or attachments while allowing the rest of the content through. To specify the content you are looking for, regular expressions and wildcards can be used in the Resource. The Resource is triggered when a rule includes the Resource, and a packet matching that rule is encountered. A Resource is applied per Service. If a connection matches the source and destination of the rule and the match parameters of the Resource, then both the action in the rule and the action in the Resource are applied.
Content Security
Page 165
Content Security
Page 166
Source Any
Destination mail_relay
Service smtp
Action Accept
Track Log
Install On Corporate_gw
mail_relay
mail_server
Accept
Log
Corporate_gw
mail_server
Any
Accept
Log
Corporate_gw
Content Security
Page 167
12. The tab that appears in this window depends on whether you chose UFP or CVP. In this tab, select the CVP/UFP server you configured in OPSEC Applications. 13. Click OK. 14. Add a rule to the Rule Base: in the Service column, select Add with Resource. 15. In the Service with Resource window, select the configured TCP service. 16. In the Resource drop-down list, select the configured TCP resource. 17. Install the security policy: Policy > Install.
It is possible to chain CVP servers in order to combine functionality, and to perform load sharing between CVP servers, in order to speed up CVP checking.
CVP Chaining
CVP servers can be chained for the purpose of combining functionality. Chaining is useful when each of the CVP servers performs a different task, such as scanning for viruses, or blocking large email attachments. In the configuration shown below, the Security Gateway server invokes the first, second, and third CVP servers in turn. Figure 14-72
CVP Server Chain
Chained CVP servers are invoked in the order set by the administrator in the CVP Group object. When choosing a chaining order, consider whether there are any security or connectivity issues. The order in which the chained servers are called is relative to the response of the server. This is the case whether the server is on the unprotected (external interface) side of the Security Gateway or on the protected (internal interface) side. Consider a user at an internal FTP client who is downloading a file from an external FTP server. CVP checking is performed on the response from the FTP server (that is, on the downloaded file) in the order defined in the CVP Group object.
Content Security
Page 168
There is one exception to this order. The HTTP Security server allows CVP checking to be performed on the HTTP request. CVP checking of HTTP requests is performed by the CVP servers in the reverse of the order specified in the CVP Group object. CVP chaining works only if all servers in the chain are available. If one or more of the servers is unavailable, the whole CVP session is dropped. This is because skipping one of the servers may contradict the Security Policy. For example, the Security Policy may specify that both virus scanning and blocking of large attachments are mandatory.
It is possible to configure a load-sharing suspension period for a CVP server that does not respond. During that period of time, that CVP server does not take part in the load-sharing group. CVP load sharing is implemented by defining a Resource that invokes a group of CVP servers. The order in round robin mode is configured in the CVP Group object. Figure 14-73
Load Sharing between CVP Servers
Content Security
Page 169
It is possible to put a load-sharing group into a CVP chain, but it is not possible to perform load sharing between chained CVP groups. Figure 14-74
Chained Load-Sharing CVP Server Group
Content Security
Page 170
Chapter 15
Services with Application Intelligence
In This Chapter Introduction to Services with Application Intelligence DCE-RPC SSLv3 Service SSHv2 Service FTP_BASIC Protocol Type Domain_UDP Service Point-to-Point Tunneling Protocol (PPTP) Blocking Visitor Mode (TCPT) 171 171 172 172 172 172 172 173
DCE-RPC
DCE-RPC (Distributed Computing Environment- Remote Procedure Call) is a technology that calls a procedure on a remote machine. Unlike other services that are associated with a specific TCP or UDP port, DCE-RPC uses dynamically assigned port numbers assigned by the Endpoint Mapper. DCE-RPC uses the Endpoint Mapper mechanism for the purpose of dynamically assigning a port number to specific applications. A client that wishes to connect to a DCE-RPC application typically connects to TCP135 (the default RPC Endpoint Mapper port) and provides the Endpoint Mapper with a UUID number interface. In return, the Endpoint Mapper provides the client with a port to which the client can connect. SmartView Tracker logs UUID interfaces, making it possible to identify non-common UUID interfaces. UUID interfaces can be used to enforce security rules.
Page 171
SSLv3 Service
SSLv3 Service
To prevent security problems associated with earlier versions of SSL, it is possible to verify that SSL client connections are using version 3 or higher of the SSL protocol. SSLv3 enforcement is enabled using the ssl_v3 service. If the ssl_v3 service is used in a rule, and an SSLv2 connection is attempted, the connection is rejected. Many Internet browsers use SSLv2. To allow their connections to pass through the firewall, use the HTTPS service in the Rule Base.
SSHv2 Service
To prevent security problems associated with earlier versions of SSH, it is possible to verify that SSH connections are using version 2 or higher of the protocol. SSHv2 enforcement is enabled using the ssh_version_2 service. If the SSHv2 service is used in a rule, SSHv1 connections are dropped.
Domain_UDP Service
The Domain_UDP service provides access control for DNS. DNS performance when using this service has been improved. Many DNS connections are for queries which comprise one request and one reply packet. A Security Gateway normally maintains virtual DNS connections for the period of the UDP timeout. DNS verification speed can be improved by telling the firewall to delete the connection as soon as it receives the reply packet. To do this, change the property delete_on_reply (false) to true using the Database Tool. DNS logs are more informative. For example, the domain of the device making a DNS query is now shown in the Information column. DNS verification of EDNS queries is supported. This allows use of BIND. EDNS headers are allowed if they contain all zeros, other than the field that controls the packet length (maximum payload size).
Page 172
packets are checked for compliance with RFC 2637, including message type, and packet length. In addition, if the PPTP control connection closes, the GRE tunnel is also closed.
Configuring PPTP
To configure PPTP:
1. Define an object for the PPTP client that originates the connection, and an object for the PPTP server (not the destination client). 2. To allow PPTP connections through the Security Gateway, you must define a PPTP rule in the Security Rule Base using the pptp_tcp service. In the service column, set either pptp_tcp or Any (by default the pptp_tcp Service object is set to Match for Any in the Advanced Service Properties). Source pptp_client Destination pptp_server Service TCP: pptp_tcp Action Accept
3. To enforce compliance to the PPTP protocol and allow Hide NAT, turn on enforcement in IPS Application Intelligence > VPN Protocols > Point to Point Tunneling Protocol. Static NAT is supported even with the enforcement turned off. IPS enforcement is turned on by default for new installations. For upgrades it is turned off.
Advanced Configuration
It is possible to configure strict enforcement of the PPTP protocol using the pptp_strict_enforcement database property. However, this may cause connectivity problems because many PPTP applications do not rigorously conform to RFC 2637. Using the GUIdbedit database tool, go to: Table > Managed Objects > asm > AdvancedSecurityObject. Open this object, look for the line containing pptp_strict_enforcement in the value column, and change the value from false (the default setting) to true.
Page 173
Page 174
Chapter 16
Web Content Protection
In This Chapter Introduction to Web Content Protection Web Content Security in the Rule Base Securing XML Web Services (SOAP) Understanding HTTP Sessions, Connections and URLs Connectivity or Security: Web Surfers HTTP Security Server Performance 175 175 177 177 179 180
Filtering URLs
It is possible to block URL-based attacks, such as Code Red and Nimda, using a URI resource. Attacks from and to a specified source and destination can be blocked. HTTP methods (such as GET and POST) and schemes (such as http, ftp, and mailto) can also be blocked. URL patterns are specified using regular expressions. The URL can be broken into filterable components using the Host, Path and Query parameters that are specified in the Match tab.
Page 175
The Action in Rule 2 is the opposite of the Action in Rule 1. Rule 2 is required for the Enforce URI Capabilities mode. For the Enhance UFP Performance mode it is recommended to avoid problems in cases where more than one URI resource is used in the Rule Base.
URL Logging
Normally, a logged connection shows the source or destination Web server and domain (for example http://foo.bar.com). It is possible to generate extra URL logging information by performing kernel inspection on the HTTP connection, rather than using a URI Resource, which gives a less detailed log. This shows in the log the full path and query of the requested URL, not just the name of the Web server (e.g., http://foo.bar.com/products/servlet/Satellite?pagename=1234). Do this by defining a URI resource and selecting Optimize URL Logging.
For basic URL logging using the Security server: In the General tab of the URI Resource Properties window, select Enforce URI Capabilities. The Exception Track option specifies how to track connections that match this rule but fail the content security checks. An example of an exception is a connection with an unsupported scheme or method. 1. Place the URI Resource in a rule with the Action specified as Accept. 2. Select Log in the Track column. This logs the URL of all connections that match this rule.
Page 176
Stripping ActiveX tags from HTML pages. Stripping Java applet tags from HTML pages. Blocking Java attacks by blocking suspicious back connections.
More comprehensive scanning of Java, ActiveX and other executables can be accomplished with content security applications from OPSEC-certified vendors. To screen for Java and ActiveX, you need to define a URI resource and add it to a Security Rule Base rule. Refer to Creating a Resource and Using it in the Rule Base (on page 165).
Page 177
Body section
<Some content (usually a filled form which will be submitted)>
Body section
<Some content (usually an HTML page or a binary file)>
HTTP Connections
HTTP/1.1 encourages the transmission of multiple requests over a single TCP connection. Each request must still be sent in one contiguous message, and a server must send responses (on a given connection) in the order that it received the corresponding requests. Table 16-56 HTTP Request Connection Example Request # 1 Header section Post /Hello/ HTTP/1.1 Host: www.walla.co.il User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT5.0) Pragma: no-cache Content-length: 20 Connection: Keep-alive This my example body
Get /scripts/ HTTP/1.1 Host: www.walla.co.il User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT5.0) Pragma: no-cache Content-length: 0 Connection: Keep-alive
Page 178
Understanding URLs
A URL is made up of the Host, Path and Query parameters. In the URL in following example, the Host is http://www.elvis.com, the Path is /alive/qc.html, and the Query is everything else. A Security Gateway and IPS can filter the URL on these parameters and decide whether to allow the HTTP request containing a particular URL. Figure 16-75
URL Components
To allow ranges:
1. From the SmartDashboard main menu, select Policy > Global Properties. The Global Properties window opens. 2. Open the SmartDashboard Customization page and click Configure. The Advanced Configuration window opens. 3. Open Firewall > Web Security > Security> Content Security. 4. Select http_allow_ranges.
Page 179
Content Compression
Compressing content in HTTP responses is a way of increasing the speed of the connection. However, content security checks such as HTML weeding and CVP checking cannot be performed on compressed content. The Content-Encoding and Content-Type headers in the HTTP response indicate whether or not the content is compressed, for example: Content-Encoding: gzip, Content-Type: application/gzip. The http_disable_content_enc and http_disable_content_type database properties control whether or not to allow data in the HTTP response to be compressed. If these properties are false, compression of content in an HTTP response is not allowed. Both these properties can be either true or false. One may be true when the other is false. Each one affects it's own header. These properties only affect content on which one or more of the following content security checks are performed: HTML weeding, blocking Java code, CVP, SOAP.
Page 180
Page 181
Chapter 17
The Check Point IPv6 Solution
The Check Point architecture enables a smooth and secure migration to IPv6. Support for the firewall including platforms, features, and licenses has been enhanced to provide support for IPv6 integration and interoperability. In This Chapter Dual Stack for IPv4 and IPv6 Accessing the IPv6 Kernel Supported Platforms Supported Features IPv6 Licensing Installation and Configuration Working with IPv6 in SmartConsole 182 182 183 183 184 184 186
fw6 ver
Description Syntax This command displays the major and minor version number and build number. fw6 ver [-k][-f <filename>]
Page 182
Supported Platforms
Parameters
Parameter -k -f <filename>
Description Print the version name and build number of the Kernel module. Print the version name and build number to the specified file.
fw6 tab
Description The fw6 tab command enables you to view kernel table contents and change them (that is, only dynamic tables since the content of a static table is indeed static). fw6 tab [-t <table>] [-s] -c] [-f] [-o <filename>] [-r] [-u | -m <maxvals>] [[-x | -a} -e entry] [-y] [hostname]* Parameter - t <table> -s -y -f Description Specifies a table for the command. Displays a short summary of the information in the kernel table(s). Specifies to not prompt a user before executing any commands. Displays a formatted version of the table content. Every table may have its own specific format style. Dumps CL formatted output to filename, which can later be read by fw log or any other entity that can read FW log formats. Displays formatted table information in common format. Resolves IP addresses in formatted output. It is possible to add or remove an entry from an existing dynamic table by using the -a or the -x flags, respectively. These flags must be followed by the -e flag and an entry description (<entry>). A list of one or more targets. When not used, the local machine is used as the default target.
Syntax Parameters
-o <filename>
-c -r -x, -a, -e
[hostname]
Comments
If a table has the expire attribute, entries added using the -a flag will receive the default table time-out. This feature only works on local machine kernel tables and does not work on a remote machines tables like additional fw tab commands. The -x flag can be used independently of the -e flag in which case the entire table content is deleted. This feature should only be used for debug purposes. It is not advisable to arbitrarily change the content of any kernel table since doing so may have unexpected results including unexpected security and connectivity impacts.
Supported Platforms
IPv6 features are not supported in Windows platforms. All other supported platforms of this release are supported.
Supported Features
These features are supported with IPv6 traffic:
Dual IP Stack IPv4 and IPv6 Firewall
Page 183
IPv6 Licensing
IPv6 and IPv4 policy based access control Dynamically updated defenses Logging FTP Active and FTP Passive services Regular TCP and UDP services (like HTTP, SMTP, Telnet, etc.) DNS ICMPv6 service Traceroute6 IPv6 'Other' services IPv6 fragments IPv6 extension headers IPv6 in IPv4 tunnels fw6 command, for interfacing with the IPv6 kernel
IPv6 Licensing
A valid IPv6 license is required to activate the built-in IPv6 support. You can obtain a free IPv6 license from the Check Point UserCenter (http://usercenter.checkpoint.com). 1. Install the license on the Security Management server. In Multi-Domain Security Management, a license is needed on the Multi-Domain Server and all Domain Management Servers. 2. All Security Gateways must be enabled for IPv6.
Page 184
Note - The line /sbin/ifconfig <dev> inet6 add <IPv6-Address>/<Prefix-Length> is required for each interface that is configured with an IPv6 address. For example, for two interfaces: /sbin/ifconfig eth0 inet6 add 2005:1::5/64 /sbin/ifconfig eth1 inet6 add 2006:1::5/64 4. Add an executable permission to the S11ipv6 file: chmod +x S11ipv6 5. Run the ./S11ipv6 file. 6. Enable IPv6 by running the command $FWDIR/scripts/fwipv6_enable on Note - The sysconfig utility does not support IPv6 configurations. Instead, use Linux commands. For example, to add routes use ip -6 route or route -A inet6. To preserve the configuration after reboot, add the commands to the S11IPv6 file located at /etc/rc.d/rc3.d. 7. Restart the Security Gateway.
Security Recommendation
Important - We strongly recommend that you disable Stateless Address Auto Configuration on the Security Gateway. If you do not do this, your Security Gateway might be auto-configured with IPv6 addresses when there are IPv6 routers in the same LAN as your Security Gateway.
Page 185
2. For a Host object, enter the object name and the IPv6 address, (for example, IPv6 address: 2000::ab4:11)
Page 186
For a Network object, enter the network address and prefix length, (for example, IPv6 address: 2000::ab4:11 Prefix Length: 64). Note - All Check Point Gateways, including ones with IPv6 enabled, are defined using a regular IPv4 object. 3. Click OK to complete the process. The IPv6 object appears in the Network Objects tree.
These services allow filtering of source and destination addresses respectively, by defining the specification of an address, start offset and mask length in their advanced > match part.
Partial-Destination-v6
The following Inspect macro can be found in the advanced > match part: PARTIAL_DST_ADDR_MATCH6(0x0,0x0,0x0,0x0,0,0) For example, if this specification is changed to PARTIAL_DST_ADDR_MATCH6(0x0,0x0,0x11aa22bb,0x0,64,32), the service will match connections with IP destination addresses with the value 0x11aa22bb in bits 65-96.
Partial-Source-v6
The following Inspect macro can be found in the advanced > match part: PARTIAL_SRC_ADDR_MATCH6(0x0,0x0,0x0,0x0,0,0) For example, if this specification is changed to PARTIAL_SRC_ADDR_MATCH6(0x0,0x0,0x11aa22bb,0x0,64,32), the service will match connections with IP source addresses with the value 0x11aa22bb in bits 65-96.
IPv6 Rules
To create an IPv6 rule, simply use IPv6 object(s) in the rule in the same way you would with an IPv4 object. For example, to accept and log IPv6 FTP connections from host alice_v6 to host bob_v6, define the following rule: Figure 17-76
Rule: Accept and Log IPv6 Traffic
Rules with Source or Destination that are defined as Any, apply to both IPv4 and IPv6 packets. For example the following rule will drop all IPv4 and IPv6 telnet packet: Figure 17-77
Rule: Drop IPv4 and IPv6
Page 187
IPv6 Services
Predefined ICMPv6 Services
The following ICMPv6 services are defined by default under ICMP services: ICMPv6 echo-request6 ICMPv6 neighbor-advertisement ICMPv6 neighbor-solicitation ICMPv6 router- advertisement ICMPv6 router- solicitation
Page 188
the rule-base, simply drag and drop it in the Service column associated with the rule that you would like to affect.
Traceroute IPv6
Create a new service, of type other, IP protocol 17, and match string IPV6_MATCH, uh_dport > 33000, ip_ttl6 < 30.
Page 189
Chapter 18
Appendix A: Security Before Firewall Activation
In This Chapter Achieving Security Before firewall Activation Boot Security The Default Filter The Initial Policy Managing Default Filter and Initial Policy 190 190 191 192 193
Boot Security
During the boot process, there is a short period of time (measured in seconds) between the point when the computer is capable of receiving communication (and can be attacked) and the point when the security policy is loaded and is enforced. During this time, the firewall Boot Security feature protects both the internal networks behind the Security Gateway, and the computer itself. Boot Security is provided by two elements working together: Control of IP Forwarding on boot Default Filter
The Default Filter also provides protection in a scenario where firewall processes are stopped for maintenance.
Page 190
The computer is protected as soon as the Default Filter loads. Figure 18-78
How a Default Filter Protects the Security Gateway
There are several Default Filters: General Filter accepts no inbound communication (this is the default option). Drop Filter accepts no inbound or outbound communication. This filter drops all communications into and out of the gateway during a period of vulnerability. Note, however, that if the boot process requires that the gateway communicate with other hosts, then the Drop Filter should not be used. Default Filter for IPSO allowing SSH incoming communication to support remote Administration. Default Filter for IPSO allowing HTTPS incoming communication to support remote Administration. Default Filter for IPSO allowing SSH and HTTPS incoming communication to support remote Administration.
The appropriate Default Filter should be selected based on platform and communication needs. The General Filter is selected by default. The Default Filter also provides anti-spoofing protection for the Security Gateway. It ensures that packets whose source are the Security Gateway computer itself have not come from one of its interfaces.
5. If the security policy has not yet been installed, run cpconfig to regenerate the Initial Policy.
Content security 1. Continue from step 2 of Changing the Default Filter to a Drop Filter. You must ensure that your security policy does not interfere with the boot process.
Page 192
6. SmartConsole clients connect or Trust is established, and the security policy is installed. Figure 18-79
Initial Policy
The Initial Policy is enforced until a user-defined policy is installed, and is never loaded again. In subsequent boots, the regular policy is loaded immediately after the Default Filter. There are different Initial Policies for standalone and distributed setups. In a standalone configuration, where the Security Management server and the Security Gateway are on the same computer, the Initial Policy allows CPMI communication only. This permits SmartConsole clients to connect to the Security Management server. In a distributed configuration, where the Primary Security Management server is on one computer and the Security Gateway is on a different computer, the Initial Policy allows the following: Primary Security Management server computer allows CPMI communication for SmartConsole clients. Security Gateway allows cpd and fwd communication for SIC communication (to establish trust) and for Policy installation.
In a distributed configuration, the Initial Policy on the Security Gateway does not allow CPMI connections. The SmartConsole will not be able to connect to the Security Management server if the SmartConsole must access the Security Management server through a gateway running the Initial Policy. There is also an Initial Policy for a Secondary Security Management server (Management High Availability). This Initial Policy allows CPMI communication for SmartConsole clients and allows cpd and fwd communication for SIC communication (to establish trust) and for Policy installation.
Usage
$FWDIR/bin/control_bootsec [-r] [-g] Table 18-57 options control_bootsec Options -r -g Meaning Removes boot security Enables boot security
fwboot bootconf
Use the fwboot bootconf command to configure boot security options. This command is located in $FWDIR/boot.
Page 194
Usage
$FWDIR/bin/fwboot bootconf <command> [value] Table 18-58 options fwboot bootconf Options Get_ipf Meaning Reports whether firewall controls IP Forwarding. Set_ipf 0/1 Returns 1 if IP Forwarding control is enabled on boot. Returns 0 if IP Forwarding is not controlled on boot.
Turns off/on control of IP forwarding for the next boot. 0 - Turns off 1 - Turns on
Get_def
Returns the full path to the Default Filter that will be used on boot. Loads <filename> as the Default Filter in the next boot. The only safe, and recommended, place to put the default.bin file is $FWDIR\boot. (The default.bin filename is a default name.) Note - Do NOT move these files.
Set_def <filename>
comp_init_policy
Use the comp_init_policy command to generate and load, or to remove, the Initial Policy. This command generates the Initial Policy. It ensures that it will be loaded when the computer is booted, or any other time that a Policy is fetched, for example, at cpstart, or with the fw fetch localhost command. After running this command, cpconfig adds an Initial Policy if there is no previous Policy installed.
Usage
$FWDIR/bin/comp_init_policy [-u | -g] Table 18-59 options comp_init_policy Options -u Meaning Removes the current Initial Policy, and ensures that it will not be generated in future when cpconfig is run.
-g Generates the Initial Policy and ensures that it is loaded the next time a policy is fetched (at cpstart, or at next boot, or via the fw fetchlocalhost command). After running this command, cpconfig adds an Initial Policy when needed. The comp_init_policy -g command will only work if there is no previous policy. If there is a policy, make sure that after removing the policy, you delete the folder $FWDIR\state\local\FW1\. The $FWDIR/state/local/FW1 folder contains the policy that will be fetched when fw fetch localhost is run. The fw fetch localhost command is the command that installs the local policy. cpstart. comp_init_policy creates the initial policy, but has a safeguard so that the initial policy will not overwrite a regular user policy (since initial policy is only used for fresh installations or upgrade). For this reason, you must delete the $FWDIR\state\local\FW1\ directory if there is a previous policy, otherwise comp_init_policy will detect that the existing user policy and will not overwrite it. If you do not delete the previous policy, yet perform the following commands the original policy will still be loaded.
Page 195
Usage
cpstop -fwflag [-default | -proc] Table 18-60 Options for fwflag Options -default Meaning Kills firewall processes (fwd, fwm, vpnd, snmpd etc.). Logs, kernel traps, resources, and all security server connections stop working. The security policy in the kernel is replaced with the Default Filter. -proc Kills firewall processes (fwd, fwm, vpnd etc.). Logs, kernel traps, resources, and all security server connections stop working. The security policy remains loaded in the kernel. Therefore allow, reject, or drop rules that do not use resources, but only services, continue to work.
Page 196
Chapter 19
Appendix B: Legacy URL Filtering
From version R75.20 and higher there is a blade called URL Filtering. URL filtering that was configured on the Anti-Virus tab in versions before R75.20 is now called Legacy URL Filtering and is configured from the Application and URL Filtering tab. For more about URL filtering and legacy URL filtering, see the R75.20 Application Control and URL Filtering Administration Guide (http://supportcontent.checkpoint.com/documentation_download?ID=12263). The topics in this appendix apply to legacy URL filtering. In This Chapter Using URL Filtering to Limit Web Surfers Configuring URL Filtering with a UFP Server Basic URL Filtering 197 200 201
For configuration details, refer to Configuring URL Filtering with a UFP Serve ("Configuring URL Filtering with a UFP Server" on page 200)r.
Page 197
1. The client invokes a connection through the Inspection Module. 2. The HTTP Security server uses UFP to send the URL to be categorized to the third-party UFP server. 3. The UFP server inspects the file and returns a Validation Result message, notifying the Security server of the result of the inspection. 4. Based on the Validation Result message, the Inspection Module either allows or disallows the viewing of that particular Web page.
Page 198
1. The Web client invokes a connection through the Security Gateway Inspection Module. 2. The kernel Inspection Module puts up a barrier that prevents the Web clients receiving a response from the Web server before a confirmation is received from the UFP server. 3. HTTP requests destined for the Web server go through Security Gateway uninterrupted. 4. At the same time as step 3, the Inspection Module extracts the URL, and the AUFPD daemon establishes a UFP session with the UFP server to categorize the URL. 5. Based on the Validation Result message, AUFPD tells the Inspection Module whether or not to block the URL. 6. If the URL is permitted, the barrier is removed, and the HTTP response from the Web server is allowed through Security Gateway. 7. If the URL is blocked, the HTTP response is rejected.
Page 199
This means that you can only have one rule with an Enhance UFP Performance resource, for a given Source, Destination, or Service. In the Match tab of the resource, you must include all UFP categories. The Action in the rule takes place if any of the selected categories match the connection. When using Enforce URI Capabilities mode in a UFP resource, you may have more than one rule with a resource using this mode, for a given Source, Destination, or Service. However, to maintain a simpler and less error-prone Rule Base, it is recommended to use only one resource, as for the Enhance UFP Performance mode. For example, consider the following rules: Table 19-61 Enforce URL Filtering Rules No. 1 2 Source Any Any Destination Any Any Service Resource with UFP Category "Drugs" Resource with UFP Category "Alcohol" Action Drop Drop
If a connection fits the UFP category of "Alcohol": In Enhance UFP Performance mode, the connection matches Rule 1 and the connection is Accepted which is not the desired behavior. In Enforce URI Capabilities mode, the connection matches Rule 2 and the connection is Dropped.
The correct way to build this rule so that it will work in all modes, and for greater simplicity, is as follows: Table 19-62 Optimal Enforce URL Filtering Rule No. 1 Source Destination Any Any Service Resource with UFP Categories "Drugs" and "Alcohol" Action Drop
Page 200
5. Associate the Resource with the HTTP Service, and place it in a rule in the Security Rule Base. Refer to the sample rules shown below. The Action in Rule 1 is Drop because the resource matches the Blocked categories. If the resource matched the Not Blocked categories, the Actions in Rules 1 and 2 would be reversed: Allow in Rule 1, and Drop in Rule 2. Rule 2 is required for the Enforce URI Capabilities mode. For the Enhance UFP Performance mode, it is recommended to avoid problems in cases where more than one URI resource is used in the Rule Base. Table 19-63 Sample UFP Rule Base Policy No. 1 2 Source Any Any Destination Any Any Service http->Alaska_HTTP_UFP http Action Drop Accept
Page 201
This method is not recommended for large URL lists, because the list of banned sites must be defined in a file, and then manually edited and maintained, which is difficult for a large list of banned sites.
category is an optional parameter that can be any hexadecimal number. It is not currently used. Make sure that there is no white space after the category. The last line in the file must be blank. For example: 192.168.56.78 /games 192.168.25.58 The file should contain no more than 1,000 records. 2. Define a Resource that uses this file. 3. Use this Resource in a rule for all HTTP Traffic. 4. Define the Action as Reject.
Page 202
Index
A
Access Control 10 Accessing the IPv6 Kernel 181 Achieving Security Before firewall Activation 189 Activating EPQ 22 Adaptive Continuous Download 103 Adding Processing Cores to the Hardware 82 Additional Conditions for Using NAT in MGCP Networks 143 Additional Conditions for Using NAT in SIP Networks 117 Advanced Configuration 172 Advanced CVP Configuration CVP Chaining and Load Sharing 167 Advanced NAT Configuration 52 Affinity Settings 85 Agent Automatic Sign On 37 Allocating a Core for Heavy Logging 84 Allocating an Additional Core to the SND 83 Allocating Processing Cores 82 Allow Multicast RTP Connections 143 Allowing Encrypted Client Authentication 39 Allowing Incoming and Outgoing Connections 69 Allowing Internal Calls with External CallManager 149 Allowing or Restricting Content 178 Anti-Spam 101 Anti-Spam and Mail 100 Anti-Spam Logging and Monitoring 108 Anti-Spam on UTM-1 Edge Devices 105 Anti-Spam Tracking and Reporting Options 109 Anti-Virus 89 Anti-Virus Protection 89 Appendix A Security Before Firewall Activation 189 Appendix B Legacy URL Filtering 196 Application Intelligence for H.323 128 Application Intelligence for SIP 117 Architecture 89 Archive File Handling 99 Associating a RADIUS Server with Security Gateway 30 Authentication 27 Authentication Methods 32 Authentication Schemes 28 Authorizing All Standard Sign On Rules 38 Automatic and Manual NAT Rules 46 Automatic and Proxy ARP 48 Automatic Hide NAT for Internal Networks 44 Automatic ISP Link Configuration 68 Automatic Versus Manual Rules 47 Avoiding Vulnerabilities in FTP Applications 157
Basic Configuration - Network Node with Hide NAT 49 Basic Rules 13 Basic URL Filtering 200 Bidirectional NAT 46 Blocked/Accepted Commands 142 Blocking URL-Based Attacks Using URI Resources 174 Blocking Visitor Mode (Blocking Outgoing TCPT) 173 Blocking Visitor Mode (TCPT) 172 Body section 177 Boot Security 189 brctl show 79 Bridge Mode 78 Bridge Mode and Anti-Spam 106 Bridging Interfaces 79
C
Call Agent or Media Gateway Controller 141 Changing the Client Authentication Port Number 38 Changing the Default Filter to a Drop Filter 190 Changing the Port Used to Block Outgoing TCPT 173 Check Point Access Control Solution 10 Check Point Password 28 Choosing the Deployment 66 Choosing the Hide Address in Hide NAT 48 Choosing the Redundancy Mode 67 Choosing the Type of H.323-VoIP Domain 130 Choosing the URL Filtering Mode 198 Client Authentication 34 ClusterXL and Multicast Support for SIP 119 ClusterXL Support for SCCP 146 Combining CVP Chaining and Load Sharing 168 Command Line Reference 85, 193 Communication Between an Internal Network and the Internet 54 Communication Between Internal Networks 54 Communication Examples 53 comp_init_policy 194 Comparing Scan by File Direction and by IPs 91 Comparing Scan by File Direction and by IPs for FTP Protocol 92 Comparing Scan by File Direction and by IPs for HTTP Protocol 93 Comparing Scan by File Direction and by IPs for POP3 Protocol 92 Comparing Scan by File Direction and by IPs for SMTP Protocol 92 Configuring a Block List 104 Configuring a Content Anti-Spam Policy 103 Configuring a Disclaimer 108 Configuring a Security Gateway to use RADIUS Authentication 28 Configuring a Security Gateway to use SecurID Authentication 30 Configuring a Security Gateway to use TACACS+Authentication 31
Configuring an Allow List 105 Configuring an IP Reputation Policy 103 Configuring Anti-Spam 103 Configuring Anti-Spam POP3 104 Configuring Anti-Spam SMTP 104 Configuring Anti-Spoofing 16, 79 Configuring Anti-Spoofing for External Interfaces 16 Configuring Anti-Spoofing for Internal Interfaces 17 Configuring Anti-Virus 97 Configuring Anti-Virus Checking for Incoming Email 165 Configuring Anti-Virus Protection for Mail 106 Configuring Authentication 27 Configuring Authentication Tracking 41 Configuring Basic URL Filtering 201 Configuring Bridge Mode 79 Configuring Client Authentication 37 Configuring ConnectControl 76 Configuring Content Security 164 Configuring Cooperative Enforcement 21 Configuring CoreXL 85 Configuring CVP Chaining and Load Sharing 169 Configuring CVP for Web Traffic Performance 166 Configuring Default Route for ISP Redundancy Gateway 70 Configuring End Point Quarantine (EPQ) 22 Configuring File Types 98, 108 Configuring H.323-Based VoIP 130 Configuring Integrated Anti-Virus Scanning 89 Configuring IP Pool NAT 59 Configuring ISP Link Redundancy 67 Configuring Mail Anti-Virus 97, 106 Configuring MGCP-Based VoIP 144 Configuring MSN Messenger over MSNMS 153 Configuring Multicast Access Control 20 Configuring NAT 49 Configuring Network Exceptions 104 Configuring Policy for Groups of Windows Users 41 Configuring PPTP 172 Configuring Restricted Access to Specific Directories 157 Configuring SCCP-Based VoIP 146 Configuring Security Gateway Settings 98 Configuring Session Authentication 33 Configuring Settings 108 Configuring SIP-Based Instant Messenger Applications 124 Configuring SIP-based Instant Messengers 152 Configuring SIP-Based VoIP 120 Configuring SIP-T Support 124 Configuring Skype, Yahoo, ICQ and More 153 Configuring SMTP and POP3 107 Configuring SMTP, POP3, FTP and HTTP 97 Configuring the Gateway Object 56 Configuring the Security Management server Object 56 Configuring URL Filtering 199
Configuring URL Filtering with a UFP Server 199 Configuring URL Logging 175 Configuring User Authentication 32 Configuring Zero Hour Malware 97 Configuring Zero Hour Malware Protection 107 ConnectControl - Server Load Balancing 71 ConnectControl Packet Flow 72 Connecting Translated Objects on Different Interfaces 52 Connection Authentication Data 22 Connectivity or Security Web Surfers 178 Considerations for ISP Link Redundancy 66 Considering Logical Server Types 74 Content Compression 179 Content Disposition Header 178 Content Security 159 Content Security via the FTP Resource 157 Continuous Download 95 Control Allowed Protocol Commands 156 Control of IP Forwarding on Boot 189 Control Signaling and Media Protocols 112 control_bootsec 193 Controlling Signaling and Media Connections 114 Cooperative Enforcement 20 CoreXL 81 CoreXL Administration 81 cpstop -fwflag default and cpstop -fwflag proc 195 Creating a Resource and Using it in the Rule Base 164 Creating a User Template 40 Creating an IPv6 object 185 Creating User Groups 40 Creating Users 41 Creating Users and Groups 40 CVP and Anti-Virus Protection for SMTP and HTTP Traffic 161 CVP Chaining 167 CVP Load Sharing 168 CVP Servers for Anti-Virus and Malicious Content Protection 161
D
Database Updates 90 DCE-RPC 170 Default Configuration 81 Define an ICMPv6 Service 187 Defining a Custom Default Filter 191 Defining Access Control Rules 14 Defining an Access Control Policy 14 Definitions 91 Deploying OPSEC Servers 160 Dialup Link Setup for Incoming Connections 68 Disabling IPv6 functionality 185 Disabling IPv6 on IPv6 enabled modules 185 Disabling NAT in a VPN Tunnel 49 Displaying the Bridge Configuration 79 DNS Server Configuration for Incoming Connections 68 Domain_UDP Service 171 Dual Stack for IPv4 and IPv6 181
Page 204
E
Editing Implied Rules 13 Enabling Client Authentication Wait Mode 38 Enabling IPv6 on the Gateway 184 Encrypting the Password 24 End Point Quarantine (EPQ) - Intel AMT 21 Enforcement Mode 21 Enhanced UFP Performance Mode 198 Example 87, 88 Example Access Control Rule 12 Example of Automatically Generated Rule (Hide NAT) 46 Example of Automatically Generated Rules (Static NAT) 47 Excluding Specific Internal Addresses 17
How a Connection is Handled by the HTTP Security Server 161 How a Server Mediates Connections 160 How ISP Redundancy Works 62 How the Firewall Identifies TCPT 172 How the Gateway Searches for Users 27 HTTP 72 HTTP Connections 177 HTTP Request Example 176 HTTP Response Example 177 HTTP Security Server Performance 179
I
Implied Rules 12 Importance of Rule Order in User Authentication 33 Important Information 3 Improving CVP Performance for Web Traffic 162 Incoming Connections 62 Inspection of Unknown ICMPv6 Codes 187 Installation and Configuration 183 Installing and Configuring Session Authentication Agent 34 Installing User Information in the Database 41 Interface A 53 Interface B 53 Interface C 53 Internal Communication with Overlapping Addresses 52 Introduction to Anti-Spam and Mail Security 100 Introduction to Bridge Mode 78 Introduction to ConnectControl 71 Introduction to Content Security 159 Introduction to CVP Chaining and Load Sharing 167 Introduction to FTP Content Security 156 Introduction to Instant Messenger Security 150 Introduction to Integrated Anti-Virus Protection 89 Introduction to ISP Link Redundancy Configuration 67 Introduction to Services with Application Intelligence 170 Introduction to TCPT 172 Introduction to the Check Point Solution for Secure VoIP 111 Introduction to VoIP Application Intelligence 113 Introduction to Web Content Protection 174 IP Multicast Group Addressing 18 IP Pool NAT 56 IP Pool NAT for Clusters 59 IP Pool Per Interface 57 IPS Application Intelligence for SIP 118 IPS Application Intelligence Settings for H.323 128 IPv6 Extension Headers 188 IPv6 in SmartView Tracker 187 IPv6 Licensing 183 IPv6 Protocols vs. IPv4 Protocols 188 IPv6 Rules 186 IPv6 Services 187 ISP Redundancy 60
F
File Handling 98 File Type Recognition 96 Filtering URLs 174 FTP Enforcement by the Firewall Kernel 156 FTP Enforcement by the FTP Security Server 156 FTP Security 156 FTP_BASIC Protocol Type 171 Fully Automatic Sign On 37 fw ctl affinity 87 fw ctl affinity -l 87 fw ctl affinity -s 87 fw ctl multik stat 88 fwaffinity.conf 85 fwaffinty_apply 86 fwboot bootconf 193
G
Gatekeeper and Gateway Call Routing 129 Gateway Cluster Connection 65 General Steps for Configuring NAT 49 Granting User Access Using RADIUS Server Groups 29
H
H.323 Architectural Elements in the Security Rule Base 125 H.323 Rule for an Endpoint-to-Endpoint Topology 131 H.323 Rules for a Gatekeeper in an External Network 134 H.323 Rules for a Gatekeeper in DMZ Topology 137 H.323 Rules for a Gatekeeper-to-Gatekeeper Topology 132 H.323 Rules for a Gateway in DMZ Topology 139 H.323 Rules for a Gateway in the External Network 136 H.323 Rules for a Gateway-to-Gateway Topology 133 H.323 Services 130 Header section 176, 177 Hide NAT 43 Hide Versus Static 47
Page 205
ISP Redundancy and Third-Party VPNs 66 ISP Redundancy and VPNs 65 ISP Redundancy Deployments 63 ISP Redundancy Operational Modes 61 ISP Redundancy Overview 60 ISP Redundancy Script 63
Outgoing Connections 62
P
Partial Address Based Filtering 186 Partial Range Requests 178 Partial-Destination-v6 186 Partially Automatic Sign On 37 Partial-Source-v6 186 Performance Tuning 82 Performing CVP/UFP Inspection on any TCP Service 166 Per-Interface Multicast Restrictions 19 Permanent Link with Dialup for Backup 64 Persistency By Server 75 Persistency By Service 75 Persistent Server Mode 74 Persistent Server Timeout 75 Planning Considerations for NAT 47 Point-to-Point Tunneling Protocol (PPTP) 171 Port Translation 44 Predefined ICMPv6 Services 187 Preventing Denial of Service Attacks 114 Preventing IP Spoofing 15 Processing Core Allocation 82 Protocol-Specific Application Intelligence 114 Protocol-Specific Security 115
J
Java and ActiveX Security 175
L
Legal Addresses 17 Limitations in Bridge Mode 78 Load Measuring 76 Load-Balancing Methods 71 Logging Activity 26 Logging and Monitoring 99 Logging Instant Messenger Applications 152 Logical Server Types 72
M
Mail Security Overview 101 Maintaining Integrity of Other Protected Services 157 Malicious Activity Script and Alert 25 Managing Default Filter and Initial Policy 192 Manual ISP Link Configuration 68 Manual Sign On 35 Manually Changing the Link Status (fw isp_link) 63 Media Gateway 141 MGCP IP Phones 141 MGCP Network Security and Application Intelligence 142 MGCP Protocol and Devices 140 Microsoft Networking Services Security 154 Monitor Only Deployment Mode 21 Monitoring the ISP Links 61 Multicast Access Control 18 Multicast Routing Protocols 18
Q
Quarantine Policy Data 23
R
RADIUS 28 Registering the Domain and Obtaining IP Addresses 67 Reporting False Positives to Check Point 109 Reserved Local Addresses 18 Resolving Access Conflicts 38 Resources What They Are and How to Use Them 164 Restricting Access to Servers and Shares (CIFS Resource) 154 Restricting Handover Locations Using a VoIP Domain 113 Reusing IP Pool Addresses For Different Destinations 58 Routing Considerations 54 Routing Modes 129 Rule Base Elements 11 Rule Match in UFP Modes 199 Rule Match Order 45 Rule Order 13 Rules and the Rule Base 11 Running Multiple Instances of HTTP Security Server 179
N
NAT and Anti-Spoofing 49 NAT Environments 21 NAT Modes 42 NAT Priorities 57 NAT Rule Base 45 NAT Support for MSN Messenger over MSNMS 151 NAT Support for MSN Messenger over SIP 151 Network Address Translation 42 Network Configuration 53 Non-Corresponding Gateway Addresses 56
O
Object Database Configuration 54 On Linux 54 On Windows 54 One External Interface 64 Operating System Password 28 Order of Automatic Rules 47 Order of Rule Enforcement 12 Other 74
S
sam_alert Configuration 25 sam_alert Usage 25 Sample Configuration (Static and Hide NAT) 50 Sample Configuration (Using Manual Rules for Port Translation) 51 Scan By File Direction 91 Scan By File Direction Options 94
Page 206
Scan By IP Address 91 Scan Failure 98 Scanning by File Direction Selecting Data to Scan 93 SCCP Devices 145 SCCP Network Security and Application Intelligence 146 SCCP Rules for a Call Manager in a DMZ 147 SCCP Rules for a CallManager in an External Network 149 SCCP Rules for a CallManager in the Internal Network 148 Secured H.323 Topologies and NAT Support 126 Secured MGCP Topologies and NAT Support 143 Secured SIP Topologies and NAT Support 116 SecurID 30 Securing H.323-Based VoIP 125 Securing Instant Messaging Applications 150 Securing MGCP-Based VoIP 140 Securing Microsoft Networking Services (CIFS) 154 Securing SCCP-Based VoIP 145 Securing SIP-Based VoIP 115 Securing Voice Over IP 111 Securing XML Web Services (SOAP) 176 Security Management Behind NAT 55 Security Recommendation 184 Security Servers 159 Selecting a Customized Server 105 Server Availability 76 Services with Application Intelligence 170 Session Authentication 33 Setting Interface Affinities 83 Setting the fwd Daemon Affinity 84 Signaling and Media Protocols for H.323 129 Simplicity 12 Simultaneous Security Server Connections 179 Single Sign On 37 SIP Architectural Elements in the Security Rule Base 115 SIP Rules for a Peer-to-Peer No-Proxy Topology 120 SIP Rules for a Proxy in an External Network 121 SIP Rules for a Proxy in DMZ Topology 123 SIP Rules for a Proxy-to-Proxy Topology 122 SIP Services 119 SmartDashboard Configuration 68 SmartReporter 110 SmartView Monitor 110 SmartView Tracker 110 Special Considerations for Access Control 12 Specific Deployment Considerations 48 SSHv2 Service 171 SSLv3 Service 171 Starting the Session Authentication Agent 34 Static NAT 43 Supported Features 182 Supported H.323 RFCs and Standards 126 Supported Platforms 182 Supported Platforms and Features 81
Supported SIP RFCs and Standards 116 Synchronizing User Information 119, 144 Syntax 86, 87, 88
T
TACACS 31 TCP Security Server 163 The Check Point IPv6 Solution 181 The Default Filter 190 The Initial Policy 191 The Need for MGCP 140 The Need to Secure Instant Messenger Applications 150 The SCCP Protocol 145 Topology Considerations DMZ 13 Traceroute IPv6 188 Troubleshooting Cannot Complete Reboot 193 Troubleshooting SIP 125 Two External Interfaces 63
U
Undefined 32 Understanding Anti-Virus Scanning Options 91 Understanding Automatically Generated Rules 46 Understanding HTTP Sessions, Connections and URLs 176 Understanding Instant Messenger Security 151 Understanding Proactive and Stream Mode Detection 95 Understanding Scan By File Direction and Scan By IPs 91 Understanding URL Filtering 196 Understanding URLs 178 Unloading Default Filter or Initial Policy 193 URL Filtering Using the HTTP Security Server 197 URL Logging 175 Usage 193, 194, 195 User Authentication 32 Using CVP for Virus Scanning on FTP Connections 163 Using SIP on a Non-Default Port 119 Using the Default Filter for Maintenance 191 Using URL Filtering to Limit Web Surfers 196 UTM-1 Edge Anti-Virus 99
V
Verify MGCP Header Content 142 Verifying Default Filter or Initial Policy Loading 192 VoIP Application Intelligence 113 VoIP Billing Issues 114 VoIP Handover 112 VoIP Logging 115 VPN Connections 19
W
Wait Mode 36 Web Content Protection 174 Web Content Security in the Rule Base 174
Page 207
What is a DMZ? 94 What is a URI Resource? 174 When to Block Outgoing TCPT 173 When to Enforce Handover 113 Why Block Visitor Mode and Outgoing TCPT? 172 Working with IPv6 in SmartConsole 185
X
X11 Service 13
Page 208