CP R80.10 IdentityAwareness AdminGuide PDF
CP R80.10 IdentityAwareness AdminGuide PDF
CP R80.10 IdentityAwareness AdminGuide PDF
IDENTITY AWARENESS
R80.10
Administration Guide
Classification: [Protected]
© 2017 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and
distributed under licensing restricting their use, copying, distribution, and decompilation. No part
of this product or related documentation may be reproduced in any form or by any means without
prior written authorization of Check Point. While every precaution has been taken in the
preparation of this book, Check Point assumes no responsibility for errors or omissions. This
publication and features described herein are subject to change without notice.
RESTRICTED RIGHTS LEGEND:
Use, duplication, or disclosure by the government is subject to restrictions as set forth in
subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS
252.227-7013 and FAR 52.227-19.
TRADEMARKS:
Refer to the Copyright page http://www.checkpoint.com/copyright.html for a list of our
trademarks.
Refer to the Third Party copyright notices http://www.checkpoint.com/3rd_party_copyright.html
for a list of relevant copyrights and third-party licenses.
Important Information
Latest Software
We recommend that you install the most recent software release to stay up-to-date
with the latest functional improvements, stability fixes, security enhancements and
protection against new and evolving attacks.
Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments
mailto:cp_techpub_feedback@checkpoint.com?subject=Feedback on Identity
Awareness R80.10 Administration Guide.
Revision History
Date Description
21 Dec 2017 Updated the CLI commands ("Identity Awareness Commands" on page
122).
SmartConsole Toolbars
For a guided tour of SmartConsole, click What's New in the left bottom corner of SmartConsole.
Manage & Settings view - review and configure the Security Management
Server settings
Ctrl+4
Connected The administrators that are connected to the Security Management Server
Users
After you activate the Identity Awareness The Distributed Configuration tool lets you
Software Blade, you can create Access Role configure connectivity and trust rules for
objects and use them in the Source and Endpoint Identity Agents - to which Identity
Destination columns of Access Control Policy Awareness Security Gateways the Endpoint
rules. Identity Agent should connect, depending on
its IPv4 / IPv6 address, or Active Directory
AD Site.
Active Directory - Microsoft® directory This tool is installed a part of the Endpoint
information service. Stores data about user, Identity Agent: go to the Start menu > All
computer, and service identities for Programs > Check Point > Identity Agent.
authentication and access.
Note - You must have administrative access
to this Active Directory domain.
AD Query
For more information, see AD Based
Check Point clientless identity acquisition
Configuration (on page 115).
tool. It is based on Active Directory
integration and it is completely transparent
to the user.
Identity Agent
The technology is based on querying the
Active Directory Security Event Logs and Check Point dedicated client agent installed
extracting the user and computer mapping to on Windows-based user computers that
the network address from them. It is based acquires and reports identities to the Check
on Windows Management Instrumentation Point Identity Awareness Security Gateway.
(WMI), a standard Microsoft protocol. As the administrator, you, not the users,
configure the Identity Agents. There are
The Check Point Security Gateway
three types of Endpoint Identity Agents - Full,
communicates directly with the Active
Light and Custom.
Directory domain controllers and does not
require a separate server. Identity Collector
No installation is necessary on the clients, or Check Point Windows-based application,
on the Active Directory server. which collects information about identities
and their associated IP addresses, and sends
API
it to the Check PointSecurity Gateways for
In computer programming, an application identity enforcement. For more information,
programming interface (API) is a set of see sk108235
subroutine definitions, protocols, and tools http://supportcontent.checkpoint.com/soluti
for building application software. In general ons?id=sk108235.
terms, it is a set of clearly defined methods
Kerberos Rule
A computer network authentication protocol A set of traffic parameters and other
that works on the basis of tickets to allow conditions that cause specified actions to be
nodes communicating over a non-secure taken for a communication session.
network to prove their identity to one another
in a secure manner. Rule Base
Kerberos builds on symmetric key The database that contains the rules in a
cryptography and requires a trusted third security policy and defines the sequence, in
party, and optionally may use public-key which they are enforced.
cryptography during certain phases of
authentication. Security Gateway
A computer or an appliance that runs Check
LDAP Point software to inspect traffic and enforce
The Lightweight Directory Access Protocol Security Policies for connected network
(LDAP) is an open, vendor-neutral, industry resources.
standard application protocol for accessing
and maintaining distributed directory Security Management Server
information services over an Internet The server that manages, creates, stores,
Protocol (IP) network. A common use of and distributes the security policy to Security
LDAP is to provide a central place to store Gateways.
usernames and passwords. This allows many
different applications and services to connect Service Account
to the LDAP server to validate users. In Microsoft® Active Directory, a user
account created explicitly to provide a
PDP
security context for services running on
Check Point Identity Awareness Security Microsoft® Windows® Server.
Gateway that acts as Policy Decision Point:
SmartConsole
• Acquires identities from identity sources
A Check Point GUI application used to
• Shares identities with another gateways
manage security policies, monitor products
PEP and events, install updates, provision new
Check Point Identity Awareness Security devices and appliances, and manage a
Gateway that acts as Policy Enforcement multi-domain environment and each domain.
Point:
SSO
• Receives identities via identity sharing
Single sign-on is a property of access control
• Redirects users to Captive Portal of multiple related, yet independent,
RADIUS software systems. With this property, a user
logs in with a single ID and password to gain
Remote Authentication Dial-In User Service access to a connected system or systems
(RADIUS) is a networking protocol that without using different usernames or
provides centralized Authentication, passwords, or in some configurations
Authorization, and Accounting (AAA or Triple seamlessly sign on at each system. This is
A) management for users who connect and typically accomplished using the Lightweight
use a network service. RADIUS is a Directory Access Protocol (LDAP) and stored
client/server protocol that runs in the LDAP databases on (directory) servers.
application layer, and can use either TCP or
UDP as transport. Terminal Server
Microsoft® Windows-based application
server that hosts Terminal Servers, Citrix
XenApp, and Citrix XenDesktop services.
Terminal Server Identity Agent
Dedicated client agent installed on
Microsoft® Windows-based application
server that hosts Terminal Servers, Citrix
XenApp, and Citrix XenDesktop services. This
client agent acquires and reports identities to
the Check Point Identity Awareness Security
Gateway. In the past, this client agent was
called Multi-User Host (MUH) Agent.
CHAPTE R 1
Traditionally, firewalls use IP addresses to monitor traffic and are unaware of the user and
computer identities behind those IP addresses. Identity Awareness removes this notion of
anonymity since it maps users and computer identities. This lets you enforce access and audit
data based on identity.
Identity Awareness is an easy to deploy and scalable solution. It is applicable for both Active
Directory and non-Active Directory based networks as well as for employees and guest users.
Identity Awareness uses the Source and Destination IP addresses of network traffic to identity
users and computers. You can use these elements as matching criteria in the Source and
Destination fields of your policy rules:
• The identity of users or user groups
• The identity of computers or computer groups
Identity Awareness lets you define policy rules for specified users who send traffic from specified
computers or from any computer. Likewise, you can create policy rules for any user on specified
computers.
You can see the logs based on user and computer name, and not just IP addresses, in the Logs &
Monitor > Logs tab. You can see events in the Logs & Monitor Access Control views.
Identity Awareness gets identities from these identity sources. You must enable them on the
Gateway, from the Identity Awareness page of the Gateway object:
• Active Directory (AD) Query
• Browser-Based Authentication
• Identity Agents (installed on the Endpoint)
• Terminal Servers Agents
• RADIUS Accounting
• Remote Access
• Identity Collector
• Web API
Identity Awareness Security Gateways can share the identity information that they acquire with
other Identity Awareness Security Gateways. This way, users that need to pass through many
Security Gateways are only identified once. See Advanced Deployment ("Advanced Identity
Awareness Deployment" on page 88) for more information.
Identity Sources
AD Query
AD Query is an easy to deploy, clientless identity acquisition tool. It is based on Active Directory
integration and it is completely transparent to the user.
AD Query works when:
• An identified user or computer tries to access a resource that creates an authentication
request. For example, when a user logs in, unlocks a screen, shares a network drive, reads
emails through Exchange, or uses an Intranet portal.
• AD Query is selected as a way to acquire identities.
The technology is based on querying the Active Directory Security Event Logs and extracting the
user and computer mapping to the network address from them. It is based on Windows
Management Instrumentation (WMI), a standard Microsoft protocol. The Security Gateway
communicates directly with the Active Directory domain controllers and does not require a
separate server.
No installation is necessary on the clients or on the Active Directory server.
AD Query extracts user and computer identity information from the Active Directory Security Event
Logs. The system generates a Security Event Log entry when a user or a computer accesses a
network resource. For example, this occurs when a user logs in, unlocks a screen, or accesses a
network drive. Security Event Logs are not generated when a user logs out because Active
Directory cannot detect this action.
When you work with AD Query, it is important that you understand and comply with these
limitations:
• User/IP association timeout - After a predefined period of network inactivity, a user session
closes automatically. The user must log in again with the Captive Portal.
• Many user accounts connected from the same IP address - AD Query cannot detect when a
user logs out. Therefore, more than one user can have open sessions from the same IP
address. When this occurs, the permissions for each account remain active until their User/IP
association timeout occurs. In this scenario, there is a risk that currently connected users can
access network resources, for which they do not have permissions.
Item Description
1 Security Gateway
4 Network resources
The Security Gateway (1) gets security event logs from the Active Directory domain controllers (2).
A user logs in to a computer with Active Directory credentials (3).
The Active Directory domain controller (2) sends the security event log to the Security Gateway (1).
The Security Gateway gets the user name (@domain), computer name and source IP address).
The user opens a connection to the network resource (4).
The Security Gateway confirms the user identity and allows or blocks access to the resource
based on the policy.
Browser-Based Authentication
Browser-Based Authentication gets identities and authenticates users with one of these
acquisition methods:
• Captive Portal
• Transparent Kerberos Authentication
Captive Portal is a simple method that authenticates users with a web interface. When users try to
access a protected resource, they enter authentication information in a form that shows in their
browser.
Transparent Kerberos Authentication authenticates users by getting authentication data from the
browser without any user input. If authentication is successful, the user goes directly to the
specified destination. If authentication fails, the user must enter credentials in the Captive Portal.
The Captive Portal shows when a user tries to access a web resource and all of these conditions
apply:
• Captive Portal is enabled.
• The redirect option enabled for the applicable rule.
• Firewall or Application Control and URL Filtering rules block access by unidentified users to
resources that would be allowed if they were identified.
The Captive Portal also shows when Transparent Kerberos Authentication is enabled, but
authentication fails.
From the Captive Portal, users can:
• Enter their user name and password.
• Enter guest user credentials (Configured in the Portal Settings).
• Click a link to download an Identity Awareness agent (Configured in the Portal Settings).
Item Description
1 User
3 Captive Portal
The credentials go to the Security Gateway, which finds them in the AD server (4).
The user can access the requested URL in the Data Center (5).
Identity Agents
Endpoint Identity Agents are dedicated client agents installed on user computers that acquire and
report identities to the Security Gateway. As the administrator, you, not the users, configure the
Agents.
There are three types of Endpoint Identity Agents, Full, Light and Custom:
• Full – Predefined Endpoint Identity Agent that includes packet tagging and computer
authentication. It applies to all users of the computer that it is installed on. Administrator
permissions are required to use the Full Endpoint Identity Agent type. For the Full Endpoint
Identity Agent you can enforce IP spoofing protection. You can also leverage computer
authentication if you define computers in access roles.
• Light – Predefined Endpoint Identity Agent that does not include packet tagging and computer
authentication. You can install this Endpoint Identity Agent individually for each user on the
target computer. Administrator permissions are not required.
• Custom - Configure custom features for all computers that use this agent, such as MAD
services and packet tagging ("Creating Custom Endpoint Identity Agents" on page 119).The
Custom Endpoint Identity Agent is a customized installation package.
Make sure to use the correct Agent for your environment ("Creating Custom Endpoint Identity
Agents" on page 119).
This table shows the similarities and differences of the Light and Full Endpoint Identity Agent
types.
The installation file size is 7MB for both types and the installation takes less than a minute.
Item Description
1 User that is trying to connect to the internal network
4 Internal network
Terminal Servers
Terminal Servers Endpoint Identity Agent - An Endpoint Identity Agent installed on an application
server that hosts Citrix/Terminal services. The Identity Awareness Terminal Servers solution lets
the system enforce identity awareness policies on multiple users that connect from one IP
address. This functionality is necessary when an administrator must control traffic created by
users of application servers that host Microsoft Terminal Servers, Citrix XenApp, and Citrix
XenDesktop.
The Terminal Servers solution is based on reserving a set of TCP/UDP ports for each user. Each
user that is actively connected to the application server that hosts the Terminal/Citrix services is
dynamically assigned a set of port ranges. The gateway receives that information. Then, when a
user attempts to access a resource, the packet is examined and the port information is mapped to
the user.
This Endpoint Identity Agent type cannot be used for endpoint computers.
For more information, see sk66761 http://supportcontent.checkpoint.com/solutions?id=sk66761.
RADIUS Accounting
You can configure a Security Gateway with Identity Awareness to use RADIUS Accounting to get
user and computer identities directly from a RADIUS accounting client. Identity Awareness uses
this information to apply access permissions to the connection.
RADIUS Accounting gets identity data from RADIUS Accounting Requests generated by the
RADIUS accounting client. Identity Awareness uses the data from these requests to get user and
device group information from the LDAP server. Firewall rules apply these permissions to users,
computers and networks.
Item Description
1 RADIUS authentication server with RADIUS Accounting client enabled
Sends RADIUS accounting request to the gateway
3 LDAP server
Sends identity data for the user to the gateway
Item Description
4 Internal network resources
5 Internet
Remote Access
Identities are acquired for Mobile Access clients and IPSec VPN clients configured to work in
Office Mode when they connect to the Security Gateway. This option is enabled by default.
Identity Collector
Check Point Identity Collector is a Windows-based application, which collects information from
Identity Sources about identities and their associated IP addresses. The Identity Collector then
sends this information to the Check Point Firewalls for identity enforcement.
The Identity Collector supports these Identity Sources:
• Microsoft Active Directory Domain Controllers
• Cisco Identity Services Engine (ISE) Servers, versions 2.0, 2.1 and 2.2
The Identity Collector can connect with more than one Identity Source at a time. The Identity
Sources are organized in Query Pools.
A Query Pool is an object, which contains a number of Identity Sources. Each Query pool is
assigned to one gateway. The Identity Collector collects information from the Identity Sources in
the Query Pools and sends the information to the gateways.
For example: An environment has two domains: Asia.com and Euro.com.
The administrator wants the Asia Gateway to get the events from all the 4 domain controllers in
the Asia.com domain. He also wants the Euro Gateway 1 and Euro Gateway 2 to get the events
from all the 6 domain controllers in the Euro.com domain.
The administrator, therefore, creates 2 Query Pools: one, which contains all the domain
controllers in the Asia.com domain, and another one, which contains all the domain controllers in
the Euro.com domain.
The administrator will configure the Asia Gateway to get events from the Asia Query Pool, and the
two Euro Security Gateways to get events from the Euro Query Pool.
Web API
The Web API is a flexible identity source that you can use for simple integration with 3rd party
security and identity products. The web API identity source provides a flexible method for the
creation of identities based on environment needs. With the Identity Awareness web API, you can
create and revoke identities, and query the Identity Awareness Software Blade regarding users, IP
addresses, and computers.
The web API uses the REST protocol over HTTPS. The Security Gateway authenticates and
authorizes the users and computers with the information it gets from the web API.
You can create associations for users and machines. Identity Awareness can calculate their group
membership and access roles, or you can provide that information. The Web API is useful for:
• Integration with 3rd security products. For example: you can apply a special restricted access
role to quarantine an infected machine detected by a 3rd party security product.
• Integration with other authentication systems.
• Automation of administrative tasks related to Identity Awareness.
Identity Awareness web API gets JSON requests over HTTPS, and each HTTP request contains one
Identity Awareness web API command or a bulk of commands. Each API command must include a
shared secret pre-configured in SmartConsole.
The Identity Awareness web API supports 3 commands:
• add-identity - Associates an IP address to a user or a computer for a specified amount of time.
• delete-identity - Revokes sessions that match one IP address or an IP range.
• show-identity - Queries the identities related to an IP address, and other information the
Identity Awareness blade saves about this IP.
AD Query
Gets identity data seamlessly from Active Directory (AD).
RADIUS Accounting
You can configure a Security Gateway with Identity Awareness to use RADIUS Accounting to get
user and computer identities directly from a RADIUS accounting client. Identity Awareness uses
this information to apply access permissions to the connection.
RADIUS Accounting gets identity data from RADIUS Accounting Requests generated by the
RADIUS accounting client. Identity Awareness uses the data from these requests to get user and
device group information from the LDAP server. Firewall rules apply these permissions to users,
computers and networks.
Remote Access
Users who get access using IPsec VPN Office Mode can authenticate seamlessly.
Identity Collector
The Identity Collector is a Windows-based application, which collects identity information and
sends it to the gateways for identity enforcement.
Web API
The Web API is a flexible identity source that you can use for simple integration with 3rd party
security and identity products.
Deployment
Identity Awareness is commonly enabled on a perimeter Security Gateway. It is frequently used in
conjunction with Application Control.
To protect internal data centers, Identity Awareness can be enabled on an internal Security
Gateway in front of internal servers, such as data centers. This can be in addition to on the
perimeter Security Gateway but does not require a perimeter Security Gateway.
Identity Awareness can be deployed in Bridge mode or Route mode.
• In the Bridge mode, it can use an existing subnet with no change to the hosts' IP addresses.
• In the Route mode, the Security Gateway acts as a router with different subnets connected to
its network interfaces.
For redundancy, you can deploy a Security Cluster in Active-Standby (HA) or Active-Active (LS)
modes. Identity awareness supports ClusterXL HA and LS modes.
If you deploy Identity Awareness on more than one Security Gateway, you can configure the
Security Gateways to share identity information. Common scenarios include:
• Deploy on your perimeter Security Gateway and data center Security Gateway.
• Deploy on several data center Security Gateways.
Feature Port
LDAP 389
AD Query 135
AD to gateway 135
It is possible to configure these features to different ports. For more information about Identity
Awareness ports, see sk98561 http://supportcontent.checkpoint.com/solutions?id=sk98561 and
sk52421 http://supportcontent.checkpoint.com/solutions?id=sk52421.
When the SmartConsole client computer is part of the AD domain, SmartConsole suggests this
domain automatically. If you select this domain, the system creates an LDAP Account Unit with
all of the domain controllers in the organization's Active Directory.
Best Practice - We highly recommend that you go to the LDAP Account Unit and make sure
that only necessary domain controllers are in the list. If AD Query is not required to operate
with some of the domain controllers, delete them from the LDAP Servers list.
With the Identity Awareness configuration wizard you can use existing LDAP Account units or
create a new one for one AD domain.
If the SmartConsole computer is part of the domain, the Wizard fetches all the domain
controllers of the domain and all of the domain controllers are configured.
If you create a new domain, and the SmartConsole computer is not part of the domain, the
LDAP Account Unit that the system creates contains only the domain controller you set
manually. If it is necessary for AD Query to fetch data from other domain controllers, you must
add them at a later time manually to the LDAP Servers list after you complete the wizard.
To view/edit the LDAP Account Unit object, open Object Explorer (Ctrl + E), and select Servers
> LDAP Account units in the Categories tree.
The LDAP Account Unit name syntax is: <domain name>_ _ AD
For example, CORP.ACME.COM_ _ AD.
7. From the Select an Active Directory list, select the Active Directory to configure from the list
that shows configured LDAP account units or create a new domain. If you have not set up
Active Directory, you need to enter a domain name, username, password and domain
controller credentials.
8. Enter the Active Directory credentials and click Connect to verify the credentials.
Important - For AD Query you must enter domain administrator credentials. For
Browser-Based Authentication standard credentials are sufficient.
9. If you selected Browser-Based Authentication or Terminal Servers and do not wish to
configure Active Directory, select I do not wish to configure Active Directory at this time and
click Next.
10. Click Next.
If you selected Browser-Based Authentication on the first page, the Browser-Based
Authentication Settings page opens.
11. In the Browser-Based Authentication Settings page, select a URL for the portal, where
unidentified users will be directed.
The list shows all IP addresses configured for the Security Gateway. The IP address selected
by default is the Security Gateway main IP address. The same IP address can be used for other
portals with different paths. For example:
• Identity Awareness Browser-Based Authentication - 192.0.2.2/connect
• DLP Portal - 192.0.2.2/DLP
• Mobile Access Portal - 192.0.2.2/sslvpn
12. By default, access to the portal is only through internal interfaces. To change this, click Edit.
We do not recommend that you let the portal be accessed through external interfaces on a
perimeter Security Gateway.
13. Click Next. The Identity Awareness is Now Active page opens with a summary of the
acquisition methods.
If you selected Terminal Servers, the page includes a link to download the agent ("Configuring
Terminal Servers" on page 46).
14. Click Finish.
Important - When you set the option to redirect http traffic from unidentified IP addresses
to the Captive Portal, make sure to put the rule in the correct position in the Rule Base, to
avoid unwanted behavior.
In rules with access role objects, criteria matching works like this:
• When identity data for an IP is known:
• If it matches an access role, the rule is enforced and traffic is allowed or blacked based on
the action.
• If it does not match an access role, it goes on to examine the next rule.
• When identity data for an IP is unknown and:
• All rule fields match besides the source field with an access role.
• The connection is http.
• The action is set to redirect to the Captive Portal.
If all the conditions apply, the traffic is redirected to the Captive Portal to get credentials
and see if there is a match.
If not all conditions apply, there is no match and the next rule is examined.
Note - You can only redirect http traffic to the Captive Portal.
Example 1 - If an unidentified Finance user tries to access the Finance Web Server with http, a
redirect to the Captive Portal occurs. After the user enters credentials, the Security Gateway
allows access to the Finance Web Server. Access is allowed based on rule number 1, which
identifies the user through the Captive Portal as belonging to the Finance access role.
Example 2 - If an unidentified administrator tries to access the Finance Web Server with http, a
redirect to the Captive Portal occurs despite rule number 2. After the administrator is identified,
rule number 2 matches. To let the administrator access the Finance Web Server without
redirection to the Captive Portal, switch the order of rules 1 and 2 or add a network restriction to
the access role.
To prevent access to unidentified users, add another rule that ensures that only identified
employees are allowed access.
Configuring AD Query
Enabling AD Query
You must enable RADIUS Accounting on Security Gateways before they can work as a RADIUS
Accounting server.
2. Install a policy.
3. From the Security Management Server command line, go to the expert mode.
4. Run: adlogconfig a
5. Select: Use NTLMv2
6. Select: Exit and save
7. Restart the Identity Awareness wizard and continue configuring Identity Awareness.
Important - Automatic LDAP group update works only with Microsoft Active Directory
when AD Query is activated.
Automatic LDAP Group Update does not occur immediately because Identity Awareness looks for
users and groups in the LDAP cache first. The information in the cache does not contain the
updated LDAP Groups. By default, the cache contains 1,000 users and cached user information is
updated every 15 minutes.
You must deactivate the LDAP cache to get automatic LDAP Group Update assignments
immediately. This action can cause Identity Awareness to work slower.
Troubleshooting
If you experience connectivity problems between your domain controllers and Security Gateway
with Identity Awareness/Log Servers, perform the following troubleshooting steps:
In this section:
Connectivity Issues .......................................................................................................38
Use wbemtest to Verify WMI ........................................................................................38
Confirm that Security Event Logs are Recorded ........................................................39
Connectivity Issues
1. Ping the domain controller from the Security Gateway with Identity Awareness/Log Server.
2. Ping the Security Gateway with Identity Awareness/Log Server from your domain controller.
3. Perform standard network diagnostics as required.
4. Check the Logs tab of the Logs & Monitor view and see if there are drops between a Security
Gateway defined with AD Query (Source) and the domain controller (Destination). If there are
drops, see Configuring the Firewall (on page 39) and sk58881
http://supportcontent.checkpoint.com/solutions?id=sk58881.
Access Settings
Click Edit to open the Portal Access Settings window. In this window you can configure:
• Main URL - The primary URL that users are redirected to for the Captive Portal. You might
have already configured this in the Identity Awareness Wizard.
• Aliases - Click the Aliases button to Add URL aliases that are redirected to the main portal
URL. For example, ID.yourcompany.com can send users to the Captive Portal. To make the
alias work, it must be resolved to the main URL on your DNS server.
• Certificate - Click Import to import a certificate for the portal website to use. If you do not
import a certificate, the portal uses a Check Point auto-generated certificate. This can cause
browser warnings if the browser does not recognize Check Point as a trusted Certificate
Authority. See Server Certificates (on page 102) for more details.
• Accessibility - Click Edit to select from where the portal can be accessed. You might have
already configured this in the Identity Awareness Wizard. The options are based on the
topology configured for the Security Gateway.
Users are sent to the Captive Portal if they use networks connected to these interfaces.
• Through all interfaces
• Through internal interfaces
Including undefined internal interfaces
Including DMZ internal interfaces
Including VPN encrypted interfaces
• According to the Firewall policy - Select this if there is a rule that states who can access
the portal.
Authentication Settings
Click Settings to open the Authentication Settings window. In this window you can configure:
• Browser transparent Single Sign-On - Select Automatically authenticate users from
computers in the domain if Transparent Kerberos Authentication is used to identify users.
• Main URL: The URL used to begin the SSO process. If transparent authentication fails,
users are redirected to the configured Captive Portal. This URL contains the DNS name or
IP address of Identity Awareness Security Gateway.
Note - The Endpoint Identity Agent download link and the Automatic Logout option are ignored
when Transparent Kerberos Authentication SSO is successful. This is so because users do not
see the Captive Portal.
• Authentication Method - Select one method that known users must use to authenticate.
• Defined on user record (Legacy Authentication) - Takes the authentication method from
Gateway Object Properties > Other > Legacy Authentication.
• User name and password - This can be configured internally or on an LDAP server.
• RADIUS - A configured RADIUS server. Select the server from the list.
• User Directories - Select one or more places where the Security Gateway searches to find
users when they try to authenticate.
• Internal users - The directory of internal users.
• LDAP users - The directory of LDAP users. Either:
Any - Users from all LDAP servers.
Specific - Users from an LDAP server that you select.
• External user profiles - The directory of users who have external user profiles.
The default is that all user directory options are selected. You might choose only one or two
options if users are only from a specified directory or directories and you want to maximize
Security Gateway performance when users authenticate. Users with identical user names must
log in with domain\user.
Customize Appearance
Click Edit to open the Portal Customization window and edit the images that users see in the
Captive Portal. Configure the labeled elements of the image below.
2 Company Logo for Select Use my company logo for mobiles and Browse to
mobiles select a smaller logo image for users who access the
portal from mobile devices.
User Access
Configure what users can do in the Captive Portal to become identified and access the network.
• Name and password login- Users are prompted to enter an existing username and password.
This will only let known users authenticate.
• Unregistered guests login - Let guests who are not known by the Security Gateway access the
network after they enter required data.
• Ask for user agreement - Makes users sign a user agreement. Click Edit to choose an
agreement and the End-user Agreement Settings page opens. Select an agreement to use:
• Default agreement with this company name - Select this to use the standard agreement.
See the text in the Agreement preview. Replace Company Name with the name of your
company. This name is used in the agreement.
• Customized agreement - Paste the text of a customized agreement into the text box. You
can use HTML code.
• Login Fields - Edit the table shown until it contains the fields that users complete in that
sequence. Select Is Mandatory for each field that guests must complete before they can get
access to the network. To add a new field, enter it in the empty field and then click Add. Use
the green arrows to change the sequence of the fields. The first field will show the user name
in Logs & Monitor > Logs.
Session
Configure data for the logged in session using the Endpoint Identity Agent.
• Agents send keepalive every X minutes - The interval, at which the Endpoint Identity Agent
sends a keepalive signal to the Security Gateway. The keepalive is used as the server assumes
the user logged out if it is not sent. Lower values affect bandwidth and network performance.
• Users should re-authenticate every XXX minutes - For how long can users access network
resources before they have to authenticate again. When using SSO, this is irrelevant.
• Allow user to save password - When SSO is not enabled, you can let users save the passwords
they enter in the Endpoint Identity Agent login window.
The authentication failure occurs because the HTTP request header is larger than the default
maximum size. You increase the maximum HTTP request header to prevent this error.
To increase the maximum HTTP request header size, use the procedure in sk92802
http://supportcontent.checkpoint.com/solutions?id=sk92802 .
Note - A user with administrator rights must run the Terminal Servers Endpoint Identity Agent
installation.
3. Double-click the Check Point Security Gateway that has Identity Awareness enabled.
4. In the left tree, go to the Identity Awareness page.
5. Click Terminal Servers - Settings.
6. In the Accessibility section, click Edit to select from where the Terminal Servers Endpoint
Identity Agent can connect.
The options are based on the topology configured for the gateway:
• Through all interfaces
• Through internal interfaces
Including undefined internal interfaces
Including DMZ internal interfaces
Including VPN encrypted interfaces
• According to the Firewall policy - Select this, if there is a rule that states who can
access the portal.
TCP Ports The ports allocated to the user for TCP traffic.
UDP Ports The ports allocated to the user for TCP traffic.
The ID and User field information is automatically updated from processes running on the
application server. The Terminal Servers Endpoint Identity Agent assigns TCP and UDP port
ranges for each connected user.
Excluded UDP Ports Ports included in this range will not be assigned to any user for
UDP traffic. This field accepts a port range or list of ranges
(separated with a semicolon).
Maximum Ports Per User The maximum number of ports that can be assigned to a user in
each of the TCP and UDP port ranges.
Ports Reuse Timeout The number of seconds the system waits until it assigns a port to a
(seconds) new user after it has been released by another user.
Gateway Shared Secret The same password that is set on the gateway that enables trusted
communication between the Security Gateway and the application
server.
b) Internal Interfaces - Only explicitly defined internal Security Gateway interfaces can accept
connections from RADIUS Accounting clients
Including undefined internal interfaces - Also accepts connections from internal
interfaces without a defined IP address
Including DMZ internal interfaces - Also accepts connections from clients located in
the DMZ
c) Firewall Policy - Interface connections are allowed according to the Firewall policy.
3. Enter or select the RADIUS server port (default = 1813).
Important - The All Interfaces and Internal Interface options have priority over Firewall Policy
rules. If a Firewall rule is configured to block connections from RADIUS Accounting clients,
connections continue to be allowed when one of these options are selected.
A sub-index value is assigned to each Vendor-Specific attribute in a message. This lets Identity
Awareness find and use the applicable value.
Identity Awareness Administration Guide R80.10 | 50
Configuring Identity Sources
• Machine Name - The resolvable FQDN of the Identity Collector computer. The ISE Server
pxGrid client list will later show this FQDN (Administration > pxGrid Services > Client
Name) and it must be approved.
• Client certificate file - Certificate file (in jks format) for the Identity Collector, generated by
the ISE server. To create the JKS file, see the Cisco pxGrid documentation.
• Client Certificate Key – key to the above JKS file.
3. Click OK.
To filter events:
1. Go to Exclusion List.
2. Select a filter:
• Network Filter - Defines IP addresses and networks to include or exclude.
• Identity Filter - Defines user names and computer names to include or exclude. You can
filter by full names, names with wildcard or regular expression (select the checkbox).
Identity Collector to Cisco ISE Bulk session download. Fetches all the
8910
server active sessions from the ISE Server.
*DCOM uses DCE/RPC. If the domain controller uses Windows Firewall, you must configure it to
allow Identity Collector traffic: enable Remote Event Log Management > Remote Event Log
Management (RPC).
Consolidate Groups
If the gateway receives the user groups from the Identity Collector (SGT), it does not try to fetch
them from the user directory. If you enable group consolidation, the gateway fetches the group
even if it receives groups from the Identity Collector:
pdp idc groups_consolidation show
Important - The All Interfaces and Internal Interfaces options have priority over Firewall Policy
rules. If a Firewall rule is configured to block connections from Web API clients, connections
continue to be permitted when one of these options is selected.
Versioning
To provide backward and forward compatibility, you can include the Web API version in the
request URL, as shown in this table:
session-timeout Integer Timeout (in seconds) for this Identity 43200 (12 hours)
Awareness association
Response
Parameter Type Description
ipv6-address String (IP) Created IPv6 identity
Best Practice - you must include the domain name whenever available. This ensures the user is
authorized by the correct server, improves performance and prevents incorrect authorization
when there are identical user names in more than one domain.
Notes:
• The request must include user or computer information or both. The shared-secret and
ip-address fields are mandatory.
• String attributes such as user, domain and group names, must not contain curly brackets ("{",
"}"), square brackets ("[", "]"), or angle brackets ("<", ">"). Requests containing such
characters will fail.
• When you set fetch-user-groups or fetch-machine-groups or both to 1, you must also
set calculate-roles to 1. Otherwise, there is no assignment of access roles and the
request fails.
• When you set fetch-user-groups or fetch-machine-groups or both to 1, user
authorization can fail (for example, if the user cannot be found in an Account Unit). Because
the gateway sends the response before the authorization process is complete, a successful
response does not necessarily mean the gateway created the identity successfully.
• If you know the operating system and host type of the created associations, you can include
this information in the machine-os and host-type fields. This improves auditing
information, but does not affect enforcement.
• For active directory user and computer groups, which are generated with the access role
creation tool, include a special prefix:
Group prefix is ad_group_
User prefix is ad_user_
Machine prefix is ad_machine_
For example, for Active Directory user group MyGroup the user group attribute is
ad_group_MyGroup. For computer group MyMachinePC, the machine-groups attribute is
ad_machine_MyMachinePC.
Examples
Example request 1: Minimum request for user identity generation
POST https://gw.acme.com/_IA_API/v1.0/add-identity
{
"shared-secret":"****",
"ip-address":"1.2.3.5",
"user":"mary",
}
Response 1
{
"ipv4-address":"1.2.3.5",
"message":"Association sent to PDP."
}
Response 2
{
"ipv4-address":"1.1.1.1",
"message":"Association sent to PDP."
}
Response 3
{
"ipv4-address" : "2.2.2.2",
"message" : "Association sent to PDP."
}
ip-address String (IP) Association IP. Required when you revoke a Empty
single IP.
revoke-metho String Type of revoke method. It can be empty for the Empty
d deletion of a single association by an IP.
Otherwise permitted values:
mask – for the deletion of all associations in a
subnet.
range – for the deletion of all associations in a
range.
subnet String (IP) Subnet. Required when the revoke method is Empty
mask.
subnet-mask String (IP) Subnet mask. Required when the revoke Empty
method is mask.
ip-address-fir String (IP) First IP in the range. Required when the revoke Empty
st method is range.
Response
Examples
Example request 1: Delete by IP
POST https://gw.acme.com/_IA_API/1.0/delete-identity
{
"shared-secret":"****",
"ip-address":"1.1.1.1"
}
Response 1
{
"count":"1",
"ipv4-address":"1.1.1.1",
"message":"Disassociation sent to PDP."
}
Response 2
{
"count":"2",
"message":"Total of 2 IPs disassociations will be processed."
}
Response 3
{
"count":"100",
"message":"Total of 100 IPs disassociations will be processed."
}
Response
users Array All user identities on this IP. The Information includes
these fields:
• Users' full names (full name if available, falls back to user name
if not)
• Array of groups
• Array of roles
• Identity source
combined-roles Array List of all the access roles on this IP, for auditing and
enforcement purposes.
Note - If more than one identity source authenticated the user, the result shows a separate record
for each identity source.
Examples
Request 1
POST https://gw.acme.com/_IA_API/v1.0/show-identity
{
"shared-secret":"****",
"ip-address":"1.1.1.1"
}
Troubleshooting
Issues with the Web API are usually because of:
• Incorrect configuration. For example, when you enter an incorrect URL or do not authorize the
client to use the Web API.
• Incorrect command syntax, such as missing parameters or invalid parameter values.
For standard requests, HTTP response code of 200 means that the Identity Awareness service
received a valid API command. HTTP response code 500 means that the command is invalid, or an
internal error prevented the performance of the command by the API. If the request fails, the
JSON response body includes a code field, and the message field includes a textual description.
The message field shows also on success. The code field implies that the action failed. For bulk
requests, the HTTP status code is always 200. A granular error code is given for each of the
requests.
He wants to move around the organization and continue to have access to the HR Web Server.
To make this scenario work, the IT administrator does these steps:
1. Enables Identity Awareness on a Security Gateway, selects AD Query as one of the Identity
Sources and installs the policy.
2. Checks the logs in the Logs & Monitor view of SmartConsole to make sure the system
identifies James Wilson in the logs.
3. Adds an access role object to the Firewall Rule Base that lets James Wilson access the HR
Web Server from any computer and from any location.
4. Sees how the system tracks the actions of the access role in in the Logs & Monitor view of
SmartConsole.
Identity Awareness Administration Guide R80.10 | 75
Identity Awareness Use Cases
Install the policy. You can remove the static IP address from the laptop of James Wilson and give it
a dynamic IP address. The Security Gateway James Wilson, defined in the HR_Partner access role,
access the HR Web server from his laptop with a dynamic IP address.
User Experience
Jennifer McHanry does these steps:
1. Browses to the Finance server from her iPad.
The Captive Portal opens because she is not identified and therefore cannot access the
Finance Server.
2. She enters her usual system credentials in the Captive Portal.
A Welcome to the network window opens.
3. She can successfully browse to the Finance server.
the organization:
a) Right-click Source and select Access Role.
b) In the Users tab, select All identified users.
7. Create an Access Role rule in the Rule Base, to let Unauthorized Guests access only the
Internet:
a) Right-click Source and select Access Role.
b) In the Users tab, select Specific users > Unauthenticated Guests.
c) Select accept as the Action.
d) Right-click the Action column and select Edit Properties.
The Action Properties window opens.
e) Select Enable Identity Captive Portal.
f) Click OK.
User Experience
From the perspective of a guest at ACME, she does these steps:
1. Browses to an internet site from her laptop.
The Captive Portal opens because she is not identified and therefore cannot access the
Internet.
2. She enters her identifying data in the Captive Portal and reads through and accepts a network
access agreement.
A Welcome to the network window opens.
3. She can successfully browse to the Internet for a specified period of time.
Amy wants Finance users to download the Endpoint Identity Agent from the Captive Portal. She
needs to configure:
• Endpoint Identity Agents as an identity source for Identity Awareness.
• Endpoint Identity Agent deployment for the Finance department group from the Captive Portal.
She needs to deploy the Full Endpoint Identity Agent so she can set the IP spoofing protection.
No configuration is necessary on the client for IP spoofing protection.
• A rule in the Rule Base with an access role for Finance users, from all managed computers
and from all locations with IP spoofing protection enabled.
After configuration and policy install, users that browse to the Finance Web server will get the
Captive Portal and can download the Endpoint Identity Agent.
User Experience
A Finance department user does this:
1. Browses to the Finance Web server.
The Captive Portal opens because the user is not identified and cannot access the server. A
link to download the Endpoint Identity Agent is shown.
2. The user clicks the link to download the Endpoint Identity Agent.
The user automatically connects to the Security Gateway. A window opens asking the user to
trust the server.
Note - The trust window opens because the user connects to the Security Gateway with Identity
Awareness, with the File name based server discovery option. There are other server
discovery methods that do not require user trust confirmation.
3. Click OK. The user automatically connects to the Finance Web server.
The user can successfully browse to the internet for a specified period of time.
What's Next
Other options that can be configured for Endpoint Identity Agents:
• A method that determines how Endpoint Identity Agents connect to a Security Gateway enabled
with Identity Awareness and trusts it. In this scenario, the File Name server discovery method
is used.
• Access Roles ("Working with Access Roles" on page 30) to leverage computer awareness.
• End user interface protection so users cannot access the client settings.
• Let users defer client installation for a set time and ask for user agreement confirmation. See
User Access (on page 42).
• After configuration and installation of the policy, users that log in to Terminal Servers and
browse to the internet will be identified and only Sales department users will be able to access
Facebook.
When you enable Identity Awareness on a Log Server, you add user and computer identification to
Check Point logs. Administrators can then analyze network traffic and security-related events
better.
The Log Server communicates with Active Directory servers. The Log Server stores the data
extracted from the AD in an association map. When Security Gateways generate a Check Point log
entry and send it to the Log Server, the server gets the user and computer name from the
association map entry that corresponds to the source IP address of the event log. It then adds this
identity aware information to the log.
AD Query to fetch data from other domain controllers, you must add them at a later time
manually to the LDAP Servers list after you complete the wizard.
To view/edit the LDAP Account Unit object, select Servers and OPSEC in the objects tree >
LDAP Account Unit.
The LDAP Account Unit name syntax is: <domain name>_ _ AD
For example, CORP.ACME.COM_ _ AD.
5. From the Select an Active Directory list, select the Active Directory to configure from the list
that shows configured LDAP Account Units or create a new domain. If you did not set up Active
Directory, enter a domain name, username, password and domain controller credentials.
6. Enter the Active Directory credentials and click Connect to make sure the credentials are
correct.
Important - For AD Query you must enter domain administrator credentials or do the steps in
sk43874 http://supportcontent.checkpoint.com/solutions?id=sk43874.
7. Click Finish.
WMI Performance
Bandwidth between the Log Server and Active Directory Domain Controllers
The amount of data transferred between the Log Server and domain controllers depends on the
amount of events generated. The generated events include event logs and authentication events.
The amounts vary according to the applications running in the network. Programs that have many
authentication requests result in a larger amount of logs. The observed bandwidth range varies
between 0.1 to 0.25 Mbps per each 1000 users.
CPU Impact
When using AD Query, the impact on the domain controller CPU is less than 3%.
Identity Sharing
Best Practice - In environments that use many Security Gateways and AD Query, we recommend
that you set only one Security Gateway to acquire identities from a given Active Directory domain
controller for each physical site. If more than one Security Gateway gets identities from the same
AD server, the AD server can become overloaded with WMI queries.
Set these options on the Identity Awareness > Identity Sharing page of the Security Gateway
object:
• One Security Gateway to share identities with other Security Gateways. This is the Security
Gateway that gets identities from a given domain controller.
• All other Security Gateways to get identities from the Security Gateway that acquires identities
from the given domain controller.
The Deployment Scenarios (on page 90) section has more details.
Note - In the wizard this is the Username field. In the LDAP Account Unit, go to LDAP
Server Properties tab > Add > Username.
2. In LDAP Server Properties tab > Add > Login DN, add the login DN.
3. In Objects Management tab > Branches in use, edit the base DN from
DC=DOMAIN_NAME,DC=DOMAIN_SUFFIX to:
DC=SUB_DOMAIN_NAME,DC=DOMAIN_NAME,DC=DOMAIN_SUFFIX
For example, change DC=ACME,DC=local to DC=SUB,DC=ACME,DC=local
Nested Groups
Identity Awareness supports the use of LDAP nested groups. When a group is nested in another
group, users in the nested group are identified as part of the parent group. For example, if you
make Group_B a member of Group_A, Group_B members will be identified by Identity Awareness
as being part of Group A.
There are three ways to configure nested group queries:
• Recursive nested groups - The gateway sends a query with the user name to the LDAP server.
The server finds the groups that the user is a member of and sends it to the gateway. To know
if a group is nested in another group, and for each nesting level, you must send a new query.
This feature is enabled by default. The default nesting depth is configured to 20. For details,
see sk66561 http://supportcontent.checkpoint.com/solutions?id=sk66561.
• Per-user nested groups - With one LDAP query, the response includes all groups for the given
user, with all nesting levels. The server sends the groups of a given user as a flat list.
• Multi per-group nested groups - The gateway sends one LDAP query, which includes the user
name and the group. The server responds if the user is in this group or not. Best Practice -
Use this configuration for Microsoft Active Directory environment with many defined users and
groups, and less groups defined in SmartConsole.
Command Description
pdp nested_groups status Shows status
in front of the wireless switch. Install an Identity Awareness policy. The Security Gateways give
guest access after authentication in the web Captive Portal, and then they inspect the traffic
from WLAN users.
Deployment Options
You can deploy a Security Gateway enabled with Identity Awareness in two different network
options:
• IP routing mode
• Transparent mode (bridge mode)
IP routing mode – This is a regular and standard method used to deploy Security Gateways. You
usually use this mode when you deploy the Security Gateway at the perimeter. In this case, the
Security Gateway behaves as an IP router that inspects and forwards traffic from the internal
interface to the external interface and vice versa. Both interfaces should be located and
configured using different network subnets and ranges.
Transparent mode – Known also as a "bridge mode". This deployment method lets you install the
Security Gateway as a Layer 2 device, rather than an IP router. The benefit of this method is that it
does not require any changes in the network infrastructure. It lets you deploy the Security
Gateway inline in the same subnet. This deployment option is mostly suitable when you must
deploy a Security Gateway for network segregation and Data Center protection purposes.
Deployment Scenarios
Perimeter Security Gateway with Identity Awareness
Security Challenge
The Security Gateway at the perimeter behaves as a main gate for all incoming and outgoing
traffic to and from your corporate network. Users in internal networks access the Internet
resource and applications daily. Not all Internet applications and web sites are secure and some
are restricted according to corporate policy. If you block all internal access, it will impact
productivity of employees that must have access as part of their daily work definition. You can
control access to allowed applications with the Application Control blade. But you require a more
granular access policy for user and computer identity.
Access roles let you configure an identity aware policy with Application Control, to allow access
only to specified user groups to the applications on the Internet.
Enable Identity Awareness on the perimeter Security Gateway.
Deployment scenario
1. Deploy the Security Gateway at the perimeter in routing mode and define an external interface
towards the ISP (the Internet) and an internal interface points to the internal corporate
network LAN.
Optional: you can define another internal interface, which protects DMZ servers.
2. Make sure there are no NAT or Proxy servers between the gateway and your network.
Best Practice - We recommend that the Proxy server be in the DMZ network.
3. Check that the Security Gateway has connectivity to the internal AD domain controllers.
4. Make sure that users can reach the internal interface of the Security Gateway.
5. Configure the Application Control blade.
6. If you have several perimeter Security Gateways leading to the Internet, we recommend that
you manage these Security Gateways with one Security Management Server and
SmartConsole to deploy the relevant security policy.
Configuration
1. Enable Identity Awareness and select the appropriate identity sources.
2. Create access roles based on users and computers. You can create multiple access roles that
represent different departments, user and computer groups and their location in the network.
3. Add the access roles to the source column of the relevant Firewall and application control
policies.
Item Description
1 Corporate data center
6 Internet
Deployment Scenario
1. Deploy the Security Gateway inline in front of the Date Center core switch, protecting access to
the Data Center from the LAN.
2. Best Practice - We recommend that you deploy the Security Gateway in the bridge mode, to
avoid any changes in the network. However, IP routing mode is also supported.
3. Define at least two interfaces on the Security Gateway and configure them to be internal or
bridged.
4. Make sure that the Security Gateway has connectivity to the Active Directory and all relevant
internal domain controllers in the network (LAN).
5. Make sure that users from the LAN can connect to the Data Center through the Security
Gateway with an "Any Any Accept" policy.
6. Make sure that you do not have a proxy or NAT device between the Security Gateway and users
or the LAN.
Configuration
1. Enable Identity Awareness on the Security Gateway and select identity sources.
2. Create access roles for users and apply the access roles to relevant Access Control Policy
rules.
Deployment Scenario
1. Deploy or use existing Security Gateways at the perimeter and in front of the Data Center.
2. Install the Security Gateway at the perimeter in routing mode, and use at least one external
interface to the Internet and one to the internal network (define it as an internal interface).
3. Deploy the Security Gateway as an inline device in front of the Data Center in bridge mode to
avoid network changes. This is not required, but is recommended. Nonetheless, IP routing
mode is also supported.
4. Make sure that all Security Gateways in the Data Centers and perimeter can communicate
directly with each other.
5. Best Practice - We recommend that you manage the Security Gateway from one Security
Management Server and SmartConsole.
6. Make sure that there is connectivity from each Security Gateway to the Active Directory
internal domain controllers.
7. Make sure that in an "Any Any Accept" Policy, users from the LAN can connect to the desired
resources.
8. Make sure there are no NAT or Proxy servers between the gateway and your network. Best
Practice - We recommend that you put your Proxy server in the DMZ network.
Configuration
1. Enable Identity Awareness on the Security Gateway.
2. Choose the identity source method for each Security Gateway, at the perimeter and at the Data
Center.
3. Create access roles for users, and apply access roles to the applicable Firewall security rules.
4. Add access roles to the Policy.
5. In the Gateway Properties > Identity Awareness tab, select Share local identities with other
gateways.
6. Install the Policy on the perimeter Security Gateway.
Item Description
1 Corporate data centers
6 Internet
For complex multi Data Center environments where there are several Security Gateways that
protect different Data Centers and the perimeter, we recommend that you balance Endpoint
Identity Agents authentication using different Security Gateways. You can configure a list of
Security Gateways in the Endpoint Identity Agent settings, where the Endpoint Identity Agent will
connect to different Security Gateways. This provides load balancing across the Security
Gateways. Identities learned from the agents are shared between all Security Gateways in the
network.
Network Segregation
Security Challenge
Networks consist of different network segments and subnets where your internal users reside.
Users that connect to the network can potentially spread viruses and malwares across the
network that can infect other computers and servers on the network. You want to make sure that
only compliant users and computers can pass and connect across multiple network segments, as
well as authenticate users connecting to the servers and the Internet.
Deployment scenario
• Best Practice - We recommend that you deploy Security Gateways close to access networks
before the core switch.
• Access between the segments is controlled by the Security Gateway.
• Access between the LAN and Data Center is controlled by the Security Gateway.
• Access between the LAN and the Internet is controlled by the Security Gateways either at each
segment or at the perimeter Security Gateway.
• Best Practice - We recommend that you deploy the Security Gateway in bridge mode to avoid
network and routing changes.
• Each Security Gateway of a particular segment authenticates users with the selected method.
• Share identities learned from the segment Security Gateways with the perimeter Firewall to
create an outgoing traffic Firewall policy or use an Application Control policy as well.
Configuration
1. Deploy Security Gateways in each segment in bridge mode.
2. Make sure that there is no proxy or NAT device between the Security Gateways and the LAN.
3. Make sure that the Security Gateways can communicate with the Active Directory domain
controller deployed in each segment (replicated domain controllers).
If there is a general domain controller that serves all users across the segments, make sure
that all Security Gateways can connect to this domain controller.
4. Enable Identity Awareness on each Security Gateway and select an appropriate identity source
method.
5. In the Identity Awareness tab, clear the Share local identities with other gateways option.
If you want to share identities with one Security Gateway, for example, the perimeter Security
Gateway, keep this option selected and disable Get identities from other gateways in the
segment Security Gateway. Then go to the perimeter Security Gateway and select Get
identities from other gateways.
6. If you want to use Endpoint Identity Agents, then define the particular Security Gateway DNS/IP
in the agent Security Gateway configuration per access segment.
Deployment Scenario
1. Best Practice - We recommend that you deploy Security Gateways at the remote branch
offices and at headquarters in front of the Data Center and at the perimeter.
2. At remote branch offices, you can deploy low capacity Security Gateways due to a relatively low
number of users.
Deploy the remote branch Security Gateways in IP routing mode and have them function as a
perimeter Firewall and VPN gateway, establishing a VPN link to the corporate Security
Gateways.
3. Best Practice - At the corporate headquarters, we recommend that you deploy Data Center
Security Gateways to protect access to Data Center resources and applications, as well as a
perimeter Security Gateway. You can install the Data Center Security Gateway in bridge mode
to avoid changes to the existing network.
4. In this scenario, users from the branch office are identified by the local branch office Security
Gateway before connecting to the corporate network over VPN.
5. The identities learned by the branch office Security Gateways are then shared with the
headquarters' internal and perimeter Security Gateways. When a user from a branch office
attempts to connect to the Data Center, the user is identified by the Security Gateway at the
headquarters Data Center without the need for additional authentication.
Item Description
1 Internal network resources - branch office
4 Internet
6 Security Gateway with Identity Awareness that protects the data center
Configuration
1. Select a Security Gateway according to a performance guideline for your remote branch
offices.
2. Deploy the Security Gateways at the branch offices in routing mode. Define VPN site-to-site if
necessary.
3. Deploy Security Gateways inline at the Data Center. We recommend using bridge mode.
4. Deploy a Security Gateway at the perimeter that protects the internal network in routing mode.
The perimeter Security Gateway can serve as a VPN Security Gateway for branch offices as
well.
5. If you have Active Directory domain controllers replicated across your branch offices make
sure that local Security Gateways can communicate with the domain controller. In case you do
not have a local domain controller, make sure that the Security Gateways can access the
headquarters' internal domain controller over VPN.
6. Enable Identity Awareness and select the appropriate methods to get identity.
7. Create an access role and apply the roles in the security policy on the branch office Security
Gateways, perimeter and Data Center Security Gateway.
8. Share identities between the branch offices with the headquarter and Data Center Security
Gateways. In the Identity Awareness tab, select Get identities from other gateways and Share
local identities with other gateways.
Wireless Campus
Security Challenge
You use wireless networks to grant access to employees that use Wi-Fi enabled devices, guests
and contractors. Guests and contractors in some cases cannot use the corporate wired network
connection and must connect through WLAN. Furthermore, it is not intended for guests and
contractors to install any endpoint agents on their devices.
Wireless access is also intensively used to connect mobile devices such as smartphones where
agents can be installed. These devices are not part of the Active Directory domain. Wireless
networks do not give a desired level of security in terms of network access.
Deployment Scenario
1. Deploy the Security Gateway in bridge mode in front of the Wireless Switch.
2. Make sure that the Security Gateway can access the Internet or any other required resource in
the network.
3. Make sure that the Security Gateway can communicate with the authentication server, such as
Active Directory or RADIUS.
4. Check that there is no NAT or proxy device between the Security Gateway and the WLAN
network.
Configuration
1. Enable Identity Awareness on the Security Gateway.
2. Select Browser-Based Authentication as an identity source.
3. In the Gateway properties > Identity Awareness tab > Browser-Based Authentication Settings,
select Unregistered guests login and in Settings, select the fields you want guests to fill when
they register.
4. Select Log out users when they close the portal browser.
Deployment Scenario
In this deployment scenario, you have to choose an appropriate appliance to deploy as the
dedicated Identity Awareness enabled Security Gateway. All users authenticate with this Security
Gateway.
If you enable AD Query, the dedicated Security Gateway should communicate with all Active
Directory domain controllers over WMI.
1. On the dedicated identity acquisition Security Gateway, enable the Identity Awareness feature
and select the identity method.
2. On the Security Gateways, enable Identity Awareness and select Get identities from other
gateways and Share local identities with other gateways.
Item Description
1 Internal network resources
2 Security Gateway with Identity Awareness that protects the internal network
User IDs are sent to the corporate gateways
4 Security Gateway with Identity Awareness that protects the data center
8 Internet
Advanced Browser-Based
Authentication Configuration
In This Section:
Customizing Text Strings .............................................................................................99
Adding a New Language .............................................................................................100
Server Certificates ......................................................................................................102
Transparent Kerberos Authentication Configuration ...............................................105
4. Delete the word DEFAULT and type the new English text in the required field.
5. Click OK.
6. Install the policy.
To disable a language:
Comment out the line of the specific language or delete the line.
Server Certificates
For secure SSL communication, gateways must establish trust with endpoint computers by
showing a Server Certificate. This section discusses the procedures necessary to generate and
install server certificates.
Check Point gateways, by default, use a certificate created by the Internal Certificate Authority on
the Security Management Server as their server certificate. Browsers do not trust this certificate.
When an endpoint computer tries to connect to the gateway with the default certificate, certificate
warning messages open in the browser. To prevent these warnings, the administrator must install
a server certificate signed by a trusted certificate authority.
All portals on the same Security Gateway IP address use the same certificate.
The certificate that users see depends on the actual IP address that they use to access the portal -
not only the IP address configured for the portal in SmartConsole.
Configuration Overview
Transparent Kerberos Authentication SSO configuration includes these steps. They are described
in details in this section.
• AD configuration - Creating a user account and mapping it to a Kerberos principal name
• For HTTP connections: (HTTP/<captive portal full dns name>@DOMAIN)
• For HTTPS connections: (HTTPS/<captive portal full dns name>@DOMAIN)
• SmartConsole configuration:
• Creating an LDAP Account Unit and configuring it with SSO.
• Enabling Transparent Kerberos Authentication on the Identity Awareness Security Gateway.
• Endpoint client configuration - Configuring trusted sites in the browsers.
Where applicable, the procedures give instructions for both HTTP and HTTPS configuration.
Installing setspn.exe
Install the correct setspn.exe version on the AD server. The setspn.exe utility is not installed
by default in Windows 2003.
Important - If you used the setspn utility before, with the same principal name, but with a
different account, you must delete the different account or remove the association to the principal
name.
To remove the association, run: setspn -D HTTP/<captive_portal_full_dns_name>
<old_account name>
If you do not do this, authentication will fail.
To use setspn:
1. Open the command line (Start > Run > cmd).
2. Run setspn with this syntax:
For HTTP connections:
> setspn -A HTTP/<captive_portal_full_dns_name> <username>
For HTTPS connections:
> setspn -A HTTPS/<captive_portal_full_dns_name> <username>
Important - Make sure that you enter the command exactly as shown. All parameters are case
sensitive.
Example:
> setspn -A HTTP/mycaptive.corp.acme.com ckpsso
The AD is ready to support Kerberos authentication for the Security Gateway.
To see users associated with the principle name, run: setspn -Q HTTP*/*
c) Enter the account username you created in Creating a New User Account (on page 106).
d) Enter the account password for that user (the same password you configured for the
account username in AD) and confirm it.
e) Leave the default settings for Ticket encryption method.
f) Click OK.
7. In the Servers tab:
a) Click Add and enter the LDAP Server properties.
b) In Host, select the AD object you configured.
c) In Login DN, enter the login DN of a predefined user (added in the AD) used for LDAP
operations.
d) Enter the LDAP user password and confirm it.
e) In the Check Point Gateways are allowed to section, select Read data from this server.
f) In the Encryption tab, select Use Encryption (SSL). Fetch the fingerprint and click OK.
Note - LDAP over SSL is not supported by default. If you did not configure your domain
controller to support LDAP over SSL, configure it, or make sure Use Encryption (SSL) is
not selected.
8. In the Objects Management tab:
a) In Server to connect, select the AD object you configured.
b) Click Fetch Branches to configure the branches in use.
c) Set the number of entries supported.
9. In the Authentication tab, select Default authentication scheme > Check Point Password.
10. Click OK.
Browser Configuration
To work with Transparent Kerberos Authentication, it is necessary to configure your browser to
trust Captive Portal URL. If the portal is working with HTTPS, you must also enter the URL in the
Local Internet field using HTTPS.
Internet Explorer
It is not necessary to add the Captive Portal URL to Trusted Sites.
Google Chrome
If you have already configured Internet Explorer for Transparent Kerberos Authentication, that
configuration also works with Chrome. Use this procedure only if you did not configure Internet
Explorer for Transparent Kerberos Authentication.
Firefox
For Firefox, the Negotiate authentication option is disabled by default. To use Transparent
Kerberos Authentication, you must enable this option.
Customizing Parameters
You can change settings for Endpoint Identity Agent parameters to control Endpoint Identity Agent
behavior. You can change some of the settings in SmartConsole and others using the Endpoint
Identity Agent Configuration tool ("Creating Custom Endpoint Identity Agents" on page 119).
Parameter Description
nac_agent_disable_settings Whether users can right click the Endpoint
Identity Agent client (umbrella icon on their
desktops) and change settings.
Item Description
1 Computer for the user
SSO Configuration
SSO configuration includes two steps:
• AD Configuration - Creating a user account and mapping it to a Kerberos principal name.
• SmartConsole Configuration - Creating an LDAP Account Unit and configuring it with SSO.
AD Configuration
To use Kerberos with AD, make a Kerberos principal name with the Check Point Security Gateway
service. Map this new account to the domain name.
Use the setspn.exe utility. Make sure you have the correct version ("Installing setspn.exe" on
page 106).
Important - If you used the setspn utility before, with the same principal name, but with a
different account, you must delete the different account, or remove the association to the principal
name.
To remove the association, run: setspn -D ckp_pdp/<domain_full_dns_name> <old_account
name>
If you do not do this, authentication will fail.
Server discovery refers to the process of deciding, to which server the client should connect. We
offer several methods for configuring server discovery – from a very basic method of simply
configuring one server to a method of deploying a domain wide policy of connecting to a server
based on your current location. This section describes these options.
Server trust refers to the process of validating that the server the end user connects to is indeed a
genuine one. It also makes sure that communication between the client and the server was not
tampered with by a Man In The Middle (MITM) attack.
The trust process compares the server fingerprint calculated during the SSL handshake with the
expected fingerprint. If the client does not have the expected fingerprint configured, it will ask the
user to verify that it is correct manually. This section describes the methods that allow the
expected fingerprint to be known, without user intervention.
Comparing Options
Requires Manual Multi- Client Allows Level Recommended
AD User Trust Site Remains Ongoing for...
Required? Signed? Changes
File name No Yes No Yes No Very Single Security
based Simple Gateway
deployments
AD Based Configuration
If your endpoint computers are members of an Active Directory domain, and you have
administrative access to this domain, you can use the Distributed Configuration tool to configure
connectivity and trust rules for the Endpoint Identity Agent.
This tool is installed a part of the Endpoint Identity Agent: go to the Start menu > All Programs >
Check Point > Identity Agent.
Note - You must have administrative access to this Active Directory domain.
The Distributed Configuration tool has three panes:
• Welcome - This pane describes the tool and lets you enter alternate credentials that are used
to access the AD.
• Server Configuration - This pane lets you configure, to which Identity Awareness Security
Gateway the Endpoint Identity Agent should connect, depending on the IPv4 / IPv6 address that
is configured on the endpoint computer, or its AD Site.
• Trusted Gateways - This pane lets you view and change the list of fingerprints of Identity
Awareness Security Gateways, which the Endpoint Identity Agent considers secure.
Note - The complete configuration is written to Active Directory database - under the Program
Data branch in a hive named Check Point. This hive is added in the first run of the tool. Adding this
hive will not have any affect on other AD based applications or features.
Trusted Gateways
The Trusted Gateways pane shows the list of Identity Awareness Security Gateways considered
trusted - no pop-ups will open when the Endpoint Identity Agent tries to connect to these Identity
Awareness Gateways.
You can add, edit or delete a server. If you have connectivity to the Identity Awareness Security
Gateway, you can get the name and fingerprint by entering its address and clicking Fetch
Fingerprint. Otherwise, you should enter the same name and fingerprint that is shown when
connecting to that Identity Awareness Security Gateway.
For example:
Note - If you configure AD based and DNS based configuration, the results are combined
according to the specified priority (from the lowest to highest).
Remote Registry
If you have another way to deploy registry entries to your client computers (such as Active
Directory GPO updates), you can deploy the Security Gateway with Identity Awareness addresses
and trust parameters before you install the clients. Clients will use the already-deployed settings
immediately after installation.
Installation Type
Select whether the Endpoint Identity Agent applies to one user or to all users of the computer, on
which it is installed.
• Per-User - Install the Light Endpoint Identity Agent only for the user who does the installation.
Administrator permissions are not required for this installation.
• Per Computer - Install any Endpoint Identity Agent type for all users on the computer.
Administrator permissions are required for this installation type, even for the Light Endpoint
Identity Agent type.
Installation UI
Select one of these end user interaction options:
• FULL (Default) - Interactive installation where the end user sees the full installation interface
and can select options.
• BASIC - Non-interactive installation where the end user only sees a progress bar and a Cancel
button.
Custom Features
Select these features for the Custom Endpoint Identity Agent type:
• MAD Service - Install MAD (Managed Asset Detection) services for Kerberos SSO and
computer authentication.
• Packet Tagging - Install the packet tagging driver to enable anti-spoofing protection. The
driver signs every packet that is sent from the computer. This setting is required if you have
Firewall rules that use Access Roles and IP Spoofing is enabled.
Copy configuration
• Copy configuration from this computer - Copy Endpoint Identity Agent configuration settings
from this computer to other computers running a custom MSI file.
Save
Click to save this configuration to a custom MSI file. Enter a name for the MSI file.
Introduction
These terms are used in the CLI commands:
• PDP - Identity Awareness Policy Decision Point - Identity Awareness gateway, which is
responsible for collecting and sharing identities.
• PEP - Identity Awareness Policy Enforcement Point - Identity Awareness gateway, which is
responsible for enforcing network access restrictions. Decisions are made according to
identity data collected from the PDP.
• ADLOG - The module responsible for the acquisition of identities of entities (users or
computers) from the Active Directory. adlog runs on a Identity Awareness Security Gateway
that was enabled with AD Query, or on a Log Server.
When it runs on a Identity Awareness Security Gateway, the AD Query serves the Identity
Awareness Software Blade, which enforces the policy and logs identities.
When adlog runs on a Log Server, adlog logs identities.
The PEP and PDP processes are key components of the system. Through them, administrators
control user access and network protection.
The adlog is the command line process used to control and monitor the ADLOG feature. The
command line tool helps control users' statuses, as well as troubleshoot and monitor the system.
adlog
Description Provides commands to control and monitor the AD Query process.
When adlog runs on a Security Gateway, AD Query serves the Identity Awareness Software Blade,
which enforces policy and logs identities. In this case the command line is: adlog a
<parameter> (see below for options).
When adlog runs on a Log Server, adlog logs identities. In this case, the command line is:
adlog l <parameter> (see below for options).
Note - The l in adlog l is lowercase.
Options for adlog a and adlog l are identical.
Syntax # adlog {a|l} <parameter>
Parameter Description
<none> Displays available options for this command and exits.
query
debug
dc
statistics
See sections below.
control
control muh
control
srv_account
adlog query
Description Shows the database of identities acquired by AD Query, according to the given filter.
Usage adlog [a|l] query <parameter>
Syntax
Parameter Description
ip <IP address> Filters identities relating to the given IP address.
Parameter Description
user <user name> Filters identity mappings according to a specific user.
Example
adlog a query user jo
Shows the entry that contains the string "jo" in the user name.
adlog debug
Description Enables / Disables the adlog debug output. The output debug file is
$FWDIR/log/pdpd.elg (for Identity Awareness on a Security Gateway) or
$FWDIR/log/fwd.elg (for identity logging on a Log Server).
Usage adlog [a|l] debug <parameter>
Syntax
Parameter Description
on Turns on debug.
adlog dc
Description Shows the status of connection to the AD domain controller.
Usage adlog [a|l] dc
Syntax None
adlog statistics
Description Displays statistics regarding NT Event logs received by adlog, per IP address and
by total. It also shows the number of identified IP addresses.
Usage adlog [a|l] statistics
Syntax None
adlog control
Description Sends control commands to AD Query.
Usage adlog {a|l} control <parameter>
Syntax
Parameter Description
stop Stops AD Query. New identities are not acquired via AD Query.
Syntax
Parameter Description
mark Adds an IP address as a Multi-User Host
Syntax
Parameter Description
show Show all known service accounts
clear Clears all the accounts from the list of service accounts
pdp
Description These commands control and monitor the pdpd process (see below for options).
Syntax # pdp <command> <option>
Command Description
<none> Shows available options for this command and exits.
status Shows PDP status information, such as start time or configuration time.
connections Shows PDP connections with PEP gateways, Terminal Servers, and
Identity Collectors.
nested_groups Shows LDAP Nested groups configuration ("Nested Groups " on page
86).
vpn show Shows connected VPN gateways that send VPN Remote Access Client
identity data.
pdp status
Description Shows PDP status information, such as start time or configuration time.
Syntax # pdp status <parameter>
Parameter Description
show Displays PDP information.
pdp monitor
Description Monitors the status of connected PDP sessions. You can run different queries with
the commands below to get the output you are interested in.
Syntax # pdp monitor <parameter> <option>
user <user name> Shows session information for the given user name.
machine <computer name> Shows session information for the given computer name.
client_type {unknown | Shows all sessions that connect through the given client
portal | "Identity Agent" | type:
"AD Query"}
Possible client types are:
• unknown - User was identified by an unknown source.
• portal - User was identified by the Captive Portal.
• "Identity Agent" - User/computer was identified by
an Identity Awareness Agent.
• "AD Query" - User was identified by AD Query.
groups <group name> Shows all sessions of users / computers that are members
of the given group name.
cv_ge <version> Shows all sessions that are connected with a client version
that is higher than (or equal to) the given version.
cv_le <version> Shows all sessions that are connected via a client version
that is lower than (or equal to) the given version.
Example
pdp monitor ip 192.0.2.1
Shows the connected user behind the given IP address (192.0.2.1).
Note - The last field "Published " indicates whether the session information was already published
to the Gateway PEPs, whose IP addresses are listed.
pdp connections
Description Shows PDP connections with PEP gateways, Terminal Servers, and Identity
Collectors.
Syntax pdp connections <parameter>
Parameter Description
pep Shows the connection status of all the PEPs that should be updated by
the current PDP.
pdp network
Description Shows information about network related features.
Syntax # pdp network <parameter>
Parameter Description
info Shows a list of networks known by the PDP.
pdp update
Description Initiates a recalculation of group membership for all users and computers.
Note - Deleted accounts are not updated.
Syntax # pdp update <parameter>
Parameter Description
all Recalculates group membership for all users and computers.
pdp nested_groups
Description Defines and shows LDAP Nested groups configuration ("Nested Groups " on page
86).
Syntax # pdp nested_groups <parameter>
Parameter Description
status Shows nested groups configuration status.
show Shows a list of users, for which depth was not enough.
clear Clears the list of users, for which depth was not enough.
pdp ad
Description For AD Query, adds (or removes) an identity to the Identity Awareness database.
Syntax # pdp ad <option>
Option Description
associate For AD Query, adds an identity to the Identity Awareness database on the
Security Gateway.
disassociate For AD Query, removes the identity from the Identity Awareness
database on the Security Gateway.
pdp ad associate
Description For AD Query, adds an identity to the Identity Awareness database on the Security
Gateway. The group data must be in the AD.
Syntax # pdp ad associate ip <ip> u <username> d <domain> [m <machine>] [t
<timeout>] [s]
pdp ad disassociate
Description For AD Query, removes the identity from the Identity Awareness database on the
Security Gateway. Identity Awareness does not authenticate a user that is removed.
Syntax # pdp ad disassociate ip <ip> {u <username>|m <machine>} [r
{probed|override|timeout}]
r {probed | override Reason that is shown in the Logs & Monitor > Logs tab.
| timeout}
pdp auth
Description Configures authentication/authorization options for PDP.
Syntax # pdp auth <parameter> <option>
Parameter Description
force_domain <option> Configures PDP to match the identity's source based on the
reported domain and authorization domain.
Option Description
stat Shows the current status.
Option Description
get Shows the current Kerberos encryption status.
pdp radius
Description Shows and configures the RADIUS accounting options ("Configuring RADIUS
Accounting" on page 49).
Syntax # pdp radius <option>
Option Description
status Shows the current status.
roles {set | fetch Configures how to obtain roles from RADIUS messages.
| reset}
pdp timers
Description Shows PDP timers information for each PDP session.
Syntax # pdp timers <option>
Option Description
show Shows PDP timers information for each PDP session:
Keep Alive Timer, Ldap Fetch Timer, Pep Cache Timer, and User Auth
Timer.
pdp idc
Description Operations related to Identity Collector ("Identity Collector Optimization" on page
59).
Syntax # pdp idc <option>
Option Description
service_accounts Shows the suspected service accounts.
muh {show | mark | Shows and configures the Multi User Host detection.
unmark}
groups_consolidat Shows and configures the consolidation of external groups with fetched
ion {status | groups.
enable | disable}
pdp tasks_manager
Description Shows the status of the PDP tasks (current running, previous, and pending tasks).
Syntax # pdp tasks_manager status
pdp control
Description Provides commands to control the PDP.
Syntax # pdp control <parameter> <option>
pdp debug
Description Enables and disables the debug of the PDP.
Syntax # pdp debug <parameter> <option>
set <topic_name> Filters the PDP debug logs that would be written to the debug file
<severity> according to the given topic and severity.
Available topics are:
• all
• when needed, more specific topics will be sent by Check Point
Support
Available severities are:
• all
• critical
• surprise
• important
• events
Best Practice - We recommend to run:
pdp debug set all all
reset Resets the PDP debug options of severity and topic. The debug is still
activated after running this command.
Must be followed by the command "pdp debug off" to turn off the
debug.
rotate Rotates the PDP log files (increase the index of each log file):
$FWDIR/log/pdpd.elg becomes $FWDIR/log/pdpd.elg.0,
$FWDIR/log/pdpd.elg.0 becomes $FWDIR/log/pdpd.elg.1,
and so on.
ccc {on | off} Enables / disables the writing of the CCC debug logs into the PDP log
file $FWDIR/log/pdpd.elg.
async1 Tests async command line using the echo command for 30
seconds.
Important - Activating the debug logs affects the performance of the daemon. Make
sure to turn off the debug after you complete troubleshooting.
pep
Description Provides commands to control and monitor the PEPD process (see below for
options).
Syntax # pep <command>
Command Description
show Displays PEP information.
tracker During the PEP debug, adds the TRACKER debug topic to the PEP logs.
pep show
Description Shows information about PEP.
Syntax # pep show <parameter> <option>
Parameter Description
stat Shows the last time the pepd daemon was started and the last time a
policy was received.
user <option> Shows the status of sessions that are known to the PEP. You can
perform various queries according to the usage below to get the output
you are interested in.
pdp <option> Shows the communication channel between the PEP and the PDP.
Parameter Description
all Shows all sessions with information summary.
Parameter Description
usr <username> Shows session information for the given user name.
mchn <computer name> Shows session information for the given computer name.
Parameter Description
cid <IP> Shows session information for the given IP.
uid <uidString> Shows session information for the given session ID.
pdp <IP> Shows all session information that was published from the given
PDP IP.
ugrp <group> Shows all sessions of users that are members of the given user
group name.
mgrp <group> Shows all sessions of computers that are members of the given
computer group name.
Note - You can use multiple query tokens (parameters) at once to create a logical AND correlation
between them. For example, to display all users that have a sub string of "jo" AND are part of the
user group "Employees" you can use: # pep show user query usr jo ugrp Employees
Parameter Description
all Shows all the PDPs that are connected to the current PEP with the
relevant information.
Parameter Description
pdp Shows information about mapping between the network and PDPs.
pep show
Description Provides commands to control the PEP
Syntax # pep control <parameter> <option>
Parameter Description
portal_dual_stac Enables / Disables support for portal dual stack (IPv4 and IPv6).
k {enable |
disable}
tasks_manager Shows the status of the PEP tasks (current running, previous, and
status pending tasks).
pep debug
Description Enables and disables the debug of the PEP.
Syntax # pep debug <parameter> <option>
set <topic_name> Filters the PEP debug logs that would be written to the debug file
<severity> according to the given topic and severity.
Available topics are:
• all
• when needed, more specific topics will be sent by Check Point
Support
Available severities are:
• all
• critical
• surprise
• important
• events
Best Practice - We recommend to run:
pep debug set all all
rotate Rotates the PEP log files (increase the index of each log file):
$FWDIR/log/pepd.elg becomes $FWDIR/log/pepd.elg.0,
$FWDIR/log/pepd.elg.0 becomes $FWDIR/log/pepd.elg.1,
and so on.
Important - Activating the debug logs affects the performance of the daemon. Make
sure to turn off the debug after you complete troubleshooting.
pep tracker
Description During the PEP debug, adds the TRACKER debug topic to the PEP logs (enabled by
default). This is very useful when monitoring the PDP-to-PEP identity sharing and other
communication in distributed environments. This can be set manually by adding the TRACKER
topic to the PEP debug.
Syntax # pep tracker <parameter>
Parameter Description
on Enables the logging of TRACKER events in the PEP log.
References
For more about Kerberos SSO, see:
• http://web.mit.edu/Kerberos/ http://web.mit.edu/Kerberos/
• http://technet.microsoft.com/en-us/library/bb742433.aspx
http://technet.microsoft.com/en-us/library/bb742433.aspx
Character Description
\a alarm; the BEL character (hex 07)
Character Description
\d any decimal digit [0-9]