AEC ale ella
Security Engineering
AJ o [Vala ETAL e kL
R77 Edition
FEATURING
(eas)Check Point Education Series
Security Engineering
Student Manual
R77 Edition
} Check Point
SOFTWARE TECHNOLOGIES INC. P/N:705998© 2014 Check Point Software Technologies Ltd.
‘All rights reserved. This product and related documentation are protected by copyright and distrib
luted under licensing restricting their use, copying, distribution, and de-compilation. No part of this
product or related documentation may be reproduced in any form or by any means without prior
‘written authorization of Check Point. While every precaution has been taken in the preparation of
this book, Check Point assumes no responsibility for errors or omissions. This publication and fea-
tures described herein are subject to change without notice.
RESTRICTED RIGHTS LEGEND:
Use, duplication, or disclosure by the government is subject to restrictions as set forth in subpara-
‘graph (c)(1)(i) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-
7013 and FAR $2.227-19.
‘TRADEMARKS:
Refer to the Copyright page (htip://www.checkpoint com/copyright.html) for alist of our trade-
marks,
Refer to the Third Party copyright notices (http:// www.checkpoint.com/
3rd_party_copyright.html) for @ list of relevant copyrights and third-party licenses,International Headquarters:
3 Ha Solelim Steet
el aviv 7897, ea
eh o972.2.9514555
US. Headquarters
959 Skyway Road, Suite 300
San Carlos, CA 94070
“Technical Support, Edusetion
‘& Professional Services
{6580 Commerce Drive, Suite 120,
Irving, TX 75063
e972 444-6612
rm any comments or gusto about out cusewe
‘coraaru shel gon com
Fer qmtins comms abot ther Check Pei acento, ems:
CF eahtab Fedbneideechponicom
Document # CSERTT
Revision Ra72014
Content Mark Hoefie, Joey Witt
Graphics ‘Chunming lia —T
Contributors Beta Testing and Techneat Review
(Cris Alblas- Antow ECS. - Eland
Elie Anderson - Netnium - United States
Moshe Ashlenazy- Check Point Sofwave Technologies Israel
David Bucheie» SecareData- South Aftca
Kishin Fatnani-K-Secare India
Doron Meidan~ John Bryce Training ral
John Raymond = Wick Hill- England
Alejandro Diez Rodriguer Aina Spain
Git Rozenberg John Bryce Taian
Surf Shmute John Bryee Teining Ise,
Ek Wageman- JCA - Belgium
“Tim Hall - Shasow Peak-USA
Speciat Thanks:
Oren Pores - John Bryce Training
itn Winfield - Check Poit Software Technslogies
Rb Hughes - Check Point Software Techoologies
‘Test Development:
Ken Finley ~ Check Point
Check Point Technical Publications Team:
Rochelle Fisher, DalyYam, El Har-Bven, Pel Grigg, Richard Levine, Rivkah
Albinde, Shea Rosenfeld, Yeskov Simon
IaraetContents
Preface: Security Engineering............ 1
Introduction 2
Check Point 3D Security 6
Deployment Seenario 8
Chapter 1: Upgrading . op 9
Upgrading fo eee 10
Back up and Restore Security Gateways and Management Servers oon
Upgrading Standalone Full High Availability 16
Practice and Review oe 18
Chapter 2: Advanced Firewall ... eee eee ero)
Advanced Firewall 2.2.2.0... voce veees es 20
Check Point Firewall Infastructure vee 2
Security Gateway cone eee
Kemel Tables ... ene 2
Check Point Firewall Key Features ve 35
NAT : fie .4l
EW Monitor en vo 46
Practice and Review voce
Chapter 3: Clustering and Acceleration ..........++-00000+ 51
CChustering and Acceleration oe = 82
Clustering and Acceleration coe ©
ClusterXL: Load Sharing we coe 6
Maintenance Tesks and Tools 0
Check Point Security Engineering i‘Table of Contents,
Management HA, oR
‘SecureXL: Security Acceleration ‘i . 75
CoreXL: Multicore Acceleration. - 82
Practice and Review 87
Chapter 4: Advanced User Management ..
‘Advanced User Management
User Management
‘Troubleshooting User Authentication and User Directory (LDAP) 98
Identity Awareness . 101
Practice and Review 107
Chapter 5: Advanced IPsec VPN and Remote Access = 109
‘Advanced IPsec VPN and Remote Access : 110
‘Advanced VPN Concepts and Practices iM
Remote Access VPNs 118
Multiple Entry Point VPNs 12
Tunnel Management 123
Troubleshooting ~ 18
VPN Debug .... i coe 129
Practice and Review. 135
Chapter 6: Auditing and Reporting : - 137
Aditing and Reporting secre 1B
Auditing and Reporting Processes : wee BS
SmartEvent : : fie 4D
SmartEvent Architecture : : 143
‘SmartReporter 154
Practice and Review tenes IST
Appendix A: Gaia Maintenance .. 5 159
Appendix B: Chapter Questions and Answers ... 0 . 193
ii Check Point Certified Security EngineeringPreface Security Engineering
‘Student Manualee
Security Engineering
Introduction
Welcome to the Check Point Security Engineering course,
‘This course is intended to provide you with an understanding of key concepts and
skills necessary to effectively build, modify, deploy and troubleshoot a network
using the Cheek Point Security Firewall,
‘The Security Engineering course provides you with the following key elements:
© Advanced and in-depth explanation of Check Point firewall technology
© Key tips and techniques for troubleshooting the Firewall Software Blade,
© Advanced upgrading concepts and practices
Clustering firewall, management concepts and practices
Software acceleration features
+ Advanced VPN concepts and implementations
© Reporting tools, deployment options and features
‘This course provides hands-on training for building and configuring a network
using the Check Point Security Gateway software blade & Gaia. You will
configure a Security Gateway in standalone and clustered deployrments while
implementing certificate-based and remote access VPNs using SmartConsole
clients. You will also learn how to perform advanced troubleshooting tasks on the
firewall
Course Design
‘This course is designed for expert users and resellers who need to perform
advanced deployment configurations of a Security Gateway.
‘The following professionals benefit best from this course:
© System administrators
‘© Support analysts
© Network engineers
2 Check Point Security EngineeringIntroduction
Course Prerequi
Successful completion of this course depends on knowledge of multiple
disciplines related to network-security activities:
© UNIX and Windows operating systems
+ Certificate management
© System administration
+ CCSA trainingfcertification
‘© Networking (TCP/IP)
Course Chapters and Objectives
Chapter 1: Upgrading
4. Perform a backup of a Security Gateway and Management Server using your
understanding of the differences between backups, snapshots, and uparade-
exports
2. Upgrade a Management Server using a database migration.
Chapter 2: Advanced Firewall
1. Using your knowledge of Security Gateway infrastructure including chain
‘modules, packet flow and kemel tables, describe how to perform debugs on
firewall processes.
Chapter 3: Clustering and Acceleration
4. Build, test and troubleshoot a ClusterXL Load Sharing deployment on an
enterprise network
2, Build, test and troubleshoot a ClusterXL High Availability deployment on an
enterprise network.
‘3. Build, test and troubleshoot a management HA deployment on an enterprise
network
4. Configure, maintain and troubleshoot SecureXL and CoreXL acceleration
solutions on the corporate network traffic to ensure noted performance
‘enhancement on the firewall,
5. Build, test and troubleshoot a VRRP deployment on an enterprise network
‘Student Manual a‘Security Engineering
Chapter 4: Advanced User Management
1. Using an extemal user database such as LDAP, configure User Directory to
incorporate user information for authentication services on the network.
2, Manage intemal and external user access to resources for Remote Access or
across a VEN.
Chapter 5: Advanced IPsec VPN and Remote Access
4. Using your knowledge of fundamental VPN tunnel concepts, troubleshoot a
site-to-site or certficate-based VPN on a corporate gateway using IKEView,
VPN log files and command-line debug tools.
2, Optimize VPN performance and availability by using Link Selection and
‘Multiple Entry Point solutions.
3, Manage and test corporate VPN tunnels to allow for greater monitoring and
scalability with multiple tunnels defined in a community including other VPN
providers
Chapter 6: Auditing and Reporting
4. Create Bvents or use existing event definitions to generate reports on specific
network traffic using SmartReporter and SmartEvent in order (o provide
industry compliance information to management.
2, Using your knowledge of SmartBvent architecture and module
‘communication, troubleshoot report generation given command-line tools
and debug-fil information.
We begin our course with a study of firewall processes and procedures for
Security Management Servers and Gateways. We will take a close look at user
and kemel process, stateful inspection, and kernel tables, and note important
troubleshooting guidelines. Take note of issues you have encountered in your
experiences, and how they might have been addressed differently in your
infrastructure.
Review the course topology. Note the location of each server in relation to the
Gateway, and how they are routed. Make sure you understand the purpose for
ceach server, and the credentials used for accessing each server and the
applications used.
Finally, read through the chapter objectives. These guide you in understanding
the purpose for the lectures and lab exercises.
Cheek Poine Security EngineeringIntroduction
Lab Topology
‘This course was developed using VMware Workstation and as such all systems in
the lab topology are virtual machines running on a single host machine.
‘Your instructor will have information as to the specific settings and configuration
requirements of each virtual machine configuration, if you need them.
‘The lab topology is as follows:
Security Engineering Lab Topology
| “ae al
[ Se]
Figure 1— Lab Topology
Student Manual 5cae
‘Security Engineering
Check Point 3D Security
Applying security measures to an organization’s network is more than knowing
how to push a policy, or building a cluster. I's about knowing how that policy is
‘going to affect network processes, whether the policy will impede employee's
ability to get their job done, or whether the redundancy is needed more for
‘management, ora gateway. The Check Point 3D vision is about applying policies
to serve business needs, while enforcing network security centrally, minimizing
spact tothe users. Educating company employees about the merit of upholding.
secure business practices is part and parcel to good enforcement, because users
heed the resources the network provides to do their jobs most effectively. Users
become part of the process of security by learning the risks, applying safe
practices depending on their role in the organization, and understanding that
keeping data safe protects their jobs.
‘Throughout this course, keep in mind that to address the corporate policy, or 10
enforce changes in the corporate security infrastructure impacts employee
productivity. Security should be thought of as a process, and any security
‘measure that is implemented must take into account the needs of the individual
‘within the context of corporate mandates.
Security is a Process
‘What sets apart expert network administrators isthe understanding that nothing,
in a network is ever 100% secure, New vulnerabilities in software become
apparent daily, and security products must rush to keep pace with the ever
‘growing threats to our data, Though product patches, upgrades, and new product
releases provide some level of protection, there is a need to apply strict processes
that recognize this inherent insecurity in products. Regular maintenance cycles
‘must be implemented. Constant monitoring of évolving cyber-attacks has
become almost mandatory so that attack signatures are updated.
In order to be compliant according to the highest IT security standards today, a
company's IT security policies must be transparent. Transparency in information
security and information technology is all about having good processes, knowing
how and why they work, documenting them thoroughly, and reporting on the
result
‘The challenges to IT involve security, deployment, management, and finally
compliance. Security is the number one concer, but though security can never
be perfect, risk to your organization is still manageable.
6 Cheek Point Security EngineeringStudent Maral
(Check Point 30 Security
‘A common way of thinking about security products is that they prevent threats to
resource data. A better way to look at them is as tools to avoid risk. Threats will
always exist, and more will evolve that were never considered by the code
developers, simply because the potential for threats is enormous and impossible
{o predict. Some amount of risk is acceptable, however, and some amount is not,
‘depending on the needs of an organization. Avoiding risk is a continuous process,
‘or fo put it another way, security processes define how an organization
sinimizes risk,
In the same way banking institutions conduct double audits, and provide
monitoring of your ATM card, organizations can implement safeguards on
network traffic by creating strategic policies and automating IT processes. By
automating monitoring, enforcement, and reporting of these policies,
organizations learn employee and partner behavior regarding IT assets and
intellectual property. In learning how the data is used, processes ean be fine-tuned
igate risks even further. For example, despite malware protections, an
endpoint is found to be infected by a keylogger Trojan. Unless a process is put in
place that isolates that endpoint from infecting an entire enterprise network,
‘much of the corporate data is ata high risk of being stolen.
‘The following summarizes some guidelines to incorporating IT security best
practices, which directly apply to a typical task list for a network administrator:
4. Perform a risk assessment. Know where your risks lie, Identify areas that
show any potential for problems and assess the likelihood and level of impact
accordingly.
2. Develop and enforce a policy. Use best practices and implement them
heaviest at your most weakest point in your network. Consider the strictest
‘enforcement at first, then apply exceptions carefully based on needs
assessinents and role specific guidelines in order to minimize impact to
productivity
3. Address known vulnerabilities. Most common vulnerabilities exist in
operating systems, popular applications, Web browsers, and virtual platforms.
4, Control and Monitor devices. Itis necessary to control what is maved on
and off these devices. Monitor the devices for malicious software and provide
sufficient controls to minimize impact to the corporate network in the event
that safeguards don’t succeed. Also, decide what personnel or processes must
be involved for the control to be implemented successfully
5. Conduct audits. Periodic audits provide useful insight into the effectiveness
of the policies and enforcement measures. Adjustments to the policies are
made more effective by this insight, and should be part of the necessary
maintenance process,‘Security Engineering
Deployment Scenario
For this course, assume you are a network administrator for a company called,
‘Alpha Corp. which provides out-sourced customer contact management solutions
fora wide range of call center services. The company employs about 2,000,
employees worldwide, maintaining key departments in finance, human
resources, MIS, products, sales and comporate development.
All of the major departments are located at headquarters, and some sales staff,
technical support, MIS and data center personnel are located at the branch offices
- Bravo. A corporate firewall is already implemented. You have a dedicated
server installed for the management, and SmariConsole clients running on a
‘separate endpoint.
In addition, you have remote users employed by Alpha Corp,, ie. sales staff and
technical services personnel that need to connect via VPN to headquarters:
rons o
Figure 2— Alpha Corp
Check Point Security Engineeringcuapter’ Upgrading
Student Manual10
Uparading
Upgrading
Chapter Objectives:
Upgrades are used to save Check Point product configurations, Security Policies,
and objects, so that Security Administrators do not need to re-create Gateway and,
‘Security Management Server configurations.
Perform a backup of a Security Gateway and Management Server using your
understanding of the differences between backups, snapshots, and upgrade-
exports.
‘Upgrade and troubleshoot a Management Server using a database migration.
hack Polat Securliy EngineeringBack up and Resiore Security Gateways and Nanageniont Servers
Back up and Restore Security Gateways and Management Servers
Check Point provides three methods for backing up and restoring the operating
system and networking parameters on open servers and appliances,
+ Snapshot and Revert
* Backup and Restore
© upgrade_export’ migrate export
Each of these methods backs up certain parameters and has relative advantages
and disadvantages (ic. file size, speed, and portability),
Snapshot Image Management
Before performing an upgrade, you can use the command line to ereate a
Snapshot image of the OS, or ofthe packages distributed. Ifthe upgrade or
distribution operation fails, you can use the command line to revert the disk to the
saved image
Gaia Snapshot Image Management
With Gaia snapshot image management you an:
* Make a new image (a snapshot) of the system. You can revert to the
image at a later time,
© Revert toa locally stored image. This restores the system, including
configuration of installed products.
Delete an image from the local system,
Export an existing image. This creates a compressed version of the
‘image, You can then download the exported image to another
computer and delete the exported image from the original computer,
to save disk space.
+ Import uploads an exported image and makes an image of it
(@ snapshos). You can revert tothe image ata ater time.
> View a list of images that are stored locally.
Student Manuat
TT—_—_—_—_
Upgrading
Upgrade Tools
‘The upgrade tools backs up all Check Point configurations, independent of
hardware, operating system and Check Point version. Use this tility to backup
Check Point configuration settings on the management station. The migrate
utility is intended for upgrades or migration of database information to new
systems with hardware changes, and will not work when downgrading to an
carlier Check Point version, The file size is smaller and depends on the size of
your policy. Assuming the CPU on the machine is not over-loaded, it an be
initiated on a live system without interrupting services.
Backup Schedule Recommendations
Upgrade Tools
2
Perforin backups using any of the methods described during maintenance
‘windows to limit disruptions to services, CPU utilization, and time allotment,
‘> Snapshot — Perform snapshots at least once or before major changes, such
as upgrades.
‘® Backup — Perform a backup every couple of months, depending on how
frequently changes are made to the network or policy.
© Upgrade_export/migrate export — Export at least every month depending
‘on changes to the network or policy, and before an upgrade or migration, This,
‘method can be performed anytime outside a maintenance window.
‘Test your backups with either the backup, upgrade_export, or migrate export
files.
Before you upgrade appliances or computers, make use of the appropriate Check
Point upgrade tools. There is a different package of tools for each platform.
(After installation, you can find the upgrade tools in the installation directory),
migrate.conf For an Advanced Upgrade (migration of Security
‘Management Server database) or a Security
‘Management Server to Multi-Domain Server
migration, this file is necessary.
‘migrate Runs Advanced Upgrade or migration,
On Windows, this is migrate.exe,
‘TABLE I: Upgrade Tool Packages
‘Check Point Security EngineeringPerforming Upgrades
Support Contract
Back up and Restore Socurily Gatewaye and Managemant Servers
Upgrade Tools Packages’ | Description ee ee
pre_upgrade_verifierexe | Analyzes compatibility of the curently installed
‘configuration with the upgrade version. It gives @
report on the actions to lake before and after the
upgrade,
upgrade_export Backs up all Check Point configurations, without
‘operating system information. On Windows, this
is upgrade_exportexe,
‘parade import Restores backed up configuration. On Windows,
this is upgrade_import exe.
ep_meree ‘Used to export and impor policy packages, and
‘merge objects from a given fie into the Security
‘Management server database
TABLE I: Uparade Tool Packages
As in all upgrade procedures, first upgrade your Security Management Server or
Multi-Domain Server before upgrading the gateways. Once the management has
been successfully upgraded and contains a contract file the contract file is
transferred to a gateway when the gateway is upgraded (the contract file is
retrieved from the management)
Before upgrading a gateway or Security Management server, you need to have a
valid support contract that includes software upgrade and major releases
registered to your Check Point User Center account. The contract file is stored on
‘Security Management server and downloaded to security gateways during the
‘upgrade process. By verifying your status with the User Center, the contract file
enables you to easily remain compliant with current Check Point licensing
standards,
On Gaia, SecurePlatform and Windows
‘When upgrading Security Management server, the upgrade process checks to see
‘winether @ contract file is already present on the server. Ifnot, the main options
for obtaining a contract are displayed. You can download a contract file or
‘import it.
Ifthe contract file does not cover the Security Management server, a message on
Download or Import informs you that the Security Management server is not
Student Manwat
iB4
eligible for upgrade. The absence of a valid contract file does not prevent
upgrade. You can download a valid contract ata later date using SmmartUpdate,
On Security Gateways
‘You can upgrade Security Gateways using one of these methods:
© SmartUpdate — Centrally upgrade and manage Check Point
‘software and licenses from a SmartConsole client.
+ Local Upgrade —Do a local upgrade on the Security Gateway itself.
‘After you accept the End User License Agreement (BULA), the upgrade process
searches for a valid contract on the gateway. Ifa valid contract is not located, the
upgrade process attempts to retrieve the latest contract file from the Security
‘Management server. Ifnot found, you can download or import a contract.
Ifthe contract file does not cover the gateway, a message informs you (on
Download or Import that the gateway is not eligible for upgrade. The absence of
valid contract file does not prevent upgrade. When the upgrade is complete,
contact your local support provider to obtain a valid contract. Use SmartUpdate
(o install the contract file.
Use the download or import instructions for installing a contract file on a
Security Management Server.
Ifyou continue without a contract, you can installa valid contract file later. But
the gateway is not eligible for upgrade. You may be in violation of your Check
Point Licensing Agreement, as shown in the final message of the upgrade
‘process, In such cases, contact your reseller.
Upgrading the Security Management Server
‘You do not have to upgrade the Security Management server and all of the
‘gateways at the same time, When the Security Management server is upgraded,
‘you can still manage gateways from earlier versions (though the gateways may
not support new features).
Note: Important To upgrade, make sure there is enough free disk
space in /var/log
‘Use the Pre-Upgrade Verification Tool to reduce the risk of incompatibility with
your existing environment. The Pre-Upgrade Verification Tool generates a
detailed report of the actions to take before an upgrade.
‘Check Point Security EngineeringBack up and Restore Securily Gatoways and Management Servers
‘There are different upgrade methods for the Security Management server:
Upgrade Production Security Management server
* Migrate and Upgrade to a New Security Management server
Note: Important - After upgrade, you cannot restore a version with
a database revision that was made with the old version. You
can see old version database saves in Read-Only mode
Student Manat
isa
Uparadng
Upgrading Standalone Full High Availability
16
Full High Availability — The server and the gateway are in a standalone
configuration and each has High Availability to a second standalone machine. If
there isa failute, the server and the gateway failover to the secondary machine
In the standalone configuration the server and gateway can failover
independently of each other. For example, if only the server las an issue, only
that server fails over. There is no effect on the gateway in the standalone
configuration
‘To upgrade Full High Availability for cluster members in standalone.
configurations, there are different options:
*u
rade one machine and synchronize the second machine with
al downtime.
© Upgrade witha clean installation on one machine and synchronize the
second machine with system downtime.
Minimal Effort Upgrade
‘This upgrade method to a cluster treats each individual cluster member as an
individual gateway, assuming network downtime is permitted. In this case,
follow the same procedure for each gateway cluster member for upgrading as you
would for a distributed deployment scenario.
Upgrading with Minimal Downtime
‘You can do a Full High Availability upgrade with minimal downtime to the
‘luster members.
‘To upgrade Full High Availability with minimal downtime:
4. Make sure the primary cluster member is active and the secondary is standby:
ccheck the status of the members.
2. Start failover to the second cluster member. The secondary cluster member
processes all the traffic,
3. Log in with SmartDashboard to the management server of the secondary clus-
ter member,
4. Click Change to Active.
'5. Configure the secondary cluster member to be the active management server.
Note: We recommend to export the database using the Upgrade
tools.
Check Point Security Engineering‘Upgrading Standalone Ful High A
6, Upgrade the primary eluster member to the appropriate version.
Log in with SmartDashboard to the management server of the primary cluster
‘member. Make sure version of the SmartDashboard is the same as the server.
Upgrade the version of the object to the new version.
‘9, Install the policy on the cluster object. The primary cluster member processes
all the traffie.
Note: Make sure that the For Gateway Clusters install on all the
members option is cleared. Selecting this option causes the
installation to fal
410. Upgrade the secondary cluster member to the appropriate version,
11, Synchronize for management High Availability.
‘You can also do a Full High Availability upgrade with a clean installation on the
secondary cluster member and synchronize the primary cluster member. This
lype of upgrade causes downtime to the cluster members
Best practice: Ifthe appliance to upgrade is the primary member of a cluster,
export its database before you upgrade.
Student Manual 7a
Upgrading
Practice and Review
Practice Lab
Lab I: Upgrading to Check Point R77
Review Questions
4. When should snapshots be performed?”
2, Torunadvanced upgrade or migration, what tool is used?
3. What is a critical task for both Snapshots and Backups?
18 ‘Check Point Security EngineeringCHAPTER 2
Advanced Firewall
Student Manuateee
Tavenced Firewall
Advanced Firewall
Chapter Objectives:
‘The Check Point Firewall Software Blade builds on the award-winning
technology, first offered in Check Point's firewall solution, to provide the
industry's best gateway security with identity awareness. Check Point’s firewalls
are trusted by 100% of Fortune 100 companies and deployed by over 170,000
customers. Check Point products have demonstrated industry leadership and
continued innovation since the introduction of FiveWall-1 in 1994.
© Using knowledge of Security Gateway infrastructure, including chain
modules, packet flow and kernel tables to describe how to perform debugs on.
firevall processes.
20
Check Point Security EngineeringCheck Point Firewall Infrastructure
GUI Clients
Management
‘As a security expert considering the needs of your organization, you must apply
indepth knowledge of security gateways as you implement them beyond
simple distributed deployment. In order to establish a good fiamework for
troubleshooting gateways in a complex network topolagy, you must fully
understand the infrastructure,
You should recall that fundamentally, Check Point security components are
divided into the following components:
+ GUTclients
© Security Management
+ Security Gateway
SmartConsole applications, such as Smart View Tracker, SmartBvent,
‘SmartReporter and SmartDashboard are executable files available for Windows
‘operating systems. These GUT applications offer the administrator the ability to
configure, manage and monitor security solutions, perform maintenance tasks,
generate reports and enforce corporate policy in real-time,
Check Point periodically releases new executables that include updates for these
applications, also known as “GUI HFAs”. These, however, are not related or
aligned with Security Gateway HFAs and are considered a separate, unrelated
selease track.
‘The management component is responsible for all management operations in the
system. It contains several different components, such as the management,
reporting suite, log server, etc. Al of the functionality of the management server
is implemented in User-Mode processes, where each process is responsible for
several operations. The most significant processes are:
* FWM
* FWD
* cD
© CPWD (Check Point WatchDog)
Student Maral
2a
Bavanced Firewal
Security Gateway
The Security Gateway, usually referred to simply as the “Firewall,” is the
‘component in the system responsible for security enforcement,
‘eneryption/decryption, authentication and accounting.
‘The functionality of the security gateway is implemented both in User-Mode and
in the Kemel. As the security gateway is first and foremost a network device
rrinning an OS, itis inherently vulnerable to various network layer attacks. To
mitigate this risk and others, some of the firewall functionality is implemented in.
the OS kernel. This allows the traffic to be inspected before even getting to the
OS IP stack
Figure 3— OS Kernal
2D
Check Point Security EngineeringSe
‘Security Gateway
User and Kernel Mode Processes
As administrators trying to debug the firewall, the frst observation to make is to
decide which Firewall functionality is implemented in the user space and which
is implemented in the kernel. Once you make that distinction, you can decide the
best approach to addressing the problem, including which tool is the most
appropriate to use.
Security Gateway
Figure 4— Processes
‘The firewall kemel is responsible for the majority of the security gateway’s
‘operations, such as security enforcement, encryption/deeryption NAT, ete. In
order to detect which part of the keel might be responsible for a specific issue,
start by considering the inner structure of the FW kernel and it’s interaction with
the OS kemel, the hardware, and other kernel components, such as acceleration
‘The Kemel mode resides in the lowest possible location, Every packet that goes
through the FW is inspected. Whereas in the Network layers, you would not see
all those packets,
‘Student Marmat 23The CPD Core Process
fwm
‘The User Mode ig actually not mandatory, but it allows the FW to function more
efficiently in the application layer. The FW employs services that the OS
provides and allows easier inspection of files on open connections.
It is possible and, in some cases, required for user and kemel processes to
communicate, To allow this, there are two mechanisms: IOct! (Input/Output
Controls) and traps, When a kemel process wishes to signal to a user mode
process it sets a“trap”, ie., changes a value in a registry key. The user mode
process monitoring that flag “stumbles” on the trap and performs the requested
operation. When a user mode entity needs to write information (o a kemel
process, it uses IOct, which is an infrastructure allowing the entity to call a
function in the kemel and supply the required parameters.
(Check Point Daemon (CPD) is a core process available on every Check Point
produet. Among other things it allows the following:
4. Secure Internal Communication (SIC) fumetionality ~ Ports 18xxx are used
for this communication,
2, Status ~ Pull AMON status from the GW/Management using SmartEvent.
3, Transferring messages between FW-1 processes.
4. Policy installation ~ Receives the policy (on the GW) and pushes it forward to
relevant processes and the Kernel.
wm is available on any management product, including Multi-Domain Security
Management, and on products that require direct GUI access, such as
SmartBvent:
© GUI Client communication — This is communication between the
Management Server and the GUI client.
+ DB manipulation — This includes all getions that are performed on the
MGMT, such as object creation, rules, and users.
+ Policy compilation — fwm handles the policy compilation that is later
applied to network traffic during the inspection process,
© Management HA syne — The syne management is handled in Management
High Availability.
a
Check Point Security Engineeringfwssd
cpwd
Student Mamuat
Security Gateway
{vd allows other processes including the kernel to forward logs to extemal log
servers as well as the Security Management Server, It is related to policy
installation and also used to communicate with the kernel using command line
tools such as the fw commands; for example, when setting kemel variables or
using kemel control commands
fwssd is a child process of fwd responsible for maintaining the Security
Management Servers. Each Security Management Server will be invoked
according to activated features, such as DLP, and corresponding rules with URI
resource, SMTP resource, and authentication. The processes that actually run as
the security servers are “in.xxxx",
epwd (also known as WatchDog) is @ process that invokes and monitors critical
Processes such as Check Point daemons on the local machine, and attempts to
restart them if they fail. Among the processes monitored by Watchdog are cpd,
fwd, fwm. The epwd_admin utility is used to show the status of processes, and
to configure epwa.
25‘Ravanced Firewall
Inbound and Outbound Packet Flow
26
‘These processes work on each packet through another process called inspection.
‘To understand how the packets are inspected, consider the firewall kemel more
closely. The firewalls Kemel consists of two completely separate logical parts,
called the “Inbound” and “Outbound” representing the process of a packet
coming into and out from the firewall (respectively):
Security Gateway
Figure 5 — Firewall Kernel
Bach part of the kernel acts independent and does not assume that a packet was
inspected or processed by the other. So, some functionality is implemented both
fon the inbound and on the outbound. Some key points include:
sach direction has its own ordered chain of modules (packet processing
handlers).
‘+ Handlers decide whether to continue, terminate or hold the processing of
packet
+ Inspection is performed on virtually defragmented packets.
‘The inspection process does expect that a packet in the outbound that hasn’t
visited the inbound first originated from the gateway itself. Its also assumed that
a packet not originating from the gateway was inbound.
Cheek Point Security Engineering‘Security Gateway
Inbound fw ctl Chain Modules
In the following example, the chain modules are displayed:
mete enee
PE oneet Neste Geese
Figure 6 — Inbound Chain
In this figure, we see the inbound chain, though this is just one example and in
4ifferent configurations some chain modules will not appear and others might be
added.
Between different releases, we sometimes add or completely remove chain
‘modules, depending on the version specific design decisions.
Student Manual byRavanced Firewall
Outbound Chain Modules
Inthe following example, chain modules are displayed
CUT
Figure 7 Outbound Chain
Shown in this figure, the outbound chain shows roughly the same chain modules
fs seen on the inbound, The most significant difference is that in the inbound, the
vypn decrypt and vpn decrypt verify chain modules are seen. This makes sense
because you would expect a packet to be decrypted on the inbound. In addition,
the outbound chain also has the vpn encrypt chain module in ease the packet
needs to be encrypted on the outbound.
‘aint Security EngineeringStudent Manual
‘Security Gateway
Consider the following chain example:
Function Pontar
Tig Nemec p
Tene) Coma
Med in whieh this chain apie:
1 Stoteful Made
2 Wired Mode
3A Packete
AIA Packets (identi o 3)
Figure 8 —Location of Modules int
Chain
‘The location of the module in the chain is a relative, serial number to the location
of this chain module for this particular gateway configuration. For example, as in
the above the “fw VM outbound” isthe 6th chain module, It might be in a
different location in other gateway scenarios.
‘The chain position is an absolute number that never changes.
In the VPN chapter, we will learn that in wire mode we do not want the firewall
to enforce siatefll features on a packet. To address concerns such as this, in the
firewall kernel each kernel chain is associated with a key. This key specifies the
type of traffic applicable to this chain module. For wire-mode configuration,
chain modules marked with "I" will not apply and for stateful mode, the chain
‘modules marked with “2” will not apply. Chain modules marked with “fff...” (IP
options strip/restore) and "3” will apply to all traffic, To try this on a firewall in
your lab, run the following command:
fy etl chain
29TRavanced
Stateful Inspection
Stateful Inspection was invented by Check Point, providing accurate and highly
efficient traffic inspection, It implements all necessary firewall capabilites
between the Data and Network layers (layers 2 and 3), but is eapable of
processing data from layers 4-7 for improved security.
PROS %
Good Security Ns
* Full Application layer
° High Perfoemanae
» Exfensbiy
» Transparency
‘State Tables|
Figure 9 — Staeful Inspection
‘The inspection engine examines every packet as they are intercepted a the
"Network layer. The connection state and context information are stored and
updated dynamically inthe kernel tables.
30 Check Point Security EngineeringSecuity Gateway
‘To sec the process flow of the inspection engine, review the flow chart below:
Jamannr
NIC
‘eaten el PEE wg apne
Pocket? Sinek,
= ©
-T Hane
= = On ® "cond nacre
= }
Figure 10 — Inspection Modul
4. Packets pass through the NIC to the Inspection Module, The Inspection Mod-
ule inspects the packets and their data,
2, Packets are matched to the policy rule base, one rule ata time. Packels that do
‘not match any rule are dropped.
3. Logging and/or alerts that have been defined are activated.
4, Packets that pass inspection are moved through the TCP/IP stack to their des-
tination.
5. For packets that do not pass inspection and are rejected by the rule definition,
‘an acknowledgment is sent (ic., RST packet on TCP, and ICMP unreachable
on UDP).
6. The packets that do not pass inspection and do not apply to any of the rules,
are dropped without sending a negative acknowledgment.
Student Manwal
aTRavanced Firewall
Kernel Tables
‘There are dozens of Kernel tables, each storing information relevant to a specific
firewall function. Using the information saved in the Kemel tables, very
elaborate and precise protections can be implemented, To view all the existing
Kernel tables, type the command fw tab -t
at the command
prompt. To view only the table names and get a perspective on the number of
Kemel tables available, on SecurePlatform/Gaia use the following command:
fw tab | grep -¢“
>| more
or
fwitab -s
Note: To view the tables in coreXL, use the following instead of the
fw tab - ¢ shown above: -i #core_number
Most of the traffic related information is saved in the Kemel tables. (There i also
information stored in htabs, ghtabs, arrays, kbufs, and other devices.) Tables,
however, may be created, deleted, modified and read. In particular, consider the
Connections table.
‘The connections table is essentially an approved-connections list. The firewall, a8
‘a network security device, inspects every packet coming in and out of each
interface. After the first packet is matched against the rule base, we need to
assume that the returning packet might not be accepted in the rule base.
Let's discuss this scenario, Say that we allow 10.10.10.10 to browse to
10,10,10.20 via HTTP in the rule base and drop everything else. The syn packet
‘will match the rule base and pass, but as the Syn-Ack packet comes back with the
reversed tuple (source IP 10.10.10.20, Destination IP 10,10.10.10) and source
port 80 with a “random” destination port.
‘To mitigate this, for every recorded connection, a matching, reversed - tuple entry
is also added to the list of approved connections. Some scenarios such as NAT,
data connections and elaborate protocols, such as VoIP, introduce more
complexity to the logic behind maintaining the connections table.
2
(Check Point Security EngineeringConnections Table
‘To understand more about how the connections table works, let's consider its
important features
Student Manat
Enhanced performance
‘As we saw in the INSPECT madule flowchart, the action of matching a
packet against the rule base may be very costly (especially if there is a very
large rule base with dynamic objects and logical servers that need to be
resolved). By maintaining the list of approved connections in the connections
table, not every packet is matched against the rule base, thus saving valuable
time and computing power.
Allow server replies
We noted earlier that sometimes Server to Client packets might not match the
rulebase. In these cases, they would be handled by the connections table,
Stateful Features
© Streaming based applications (Web security, ete.)
© Sequence verification and translation
* Hide NAT (when the Server to Client packets returning to the firewall
‘ight not match the rulebase, need to add explicit entries to the
connections table),
* Logging, accounting, monitoring, ete
Client and server identification
» Data connections
aee
‘Ravanced Firewall
Connections Table Format
Bach new packet is recorded in the table in all available entries. In FireWall-1
version 4.1, only one entry was made to each new connection. Each packet had to
g0 through the connections table several times to verify all available types of
connection, Today, each packet goes through a single lookup as all available
entries are already recorded in the table.
‘TCP conection (no NAT) example
192.108.415 (30235) > 212.450 141.5 (23)
inbound packets fm the clan to the server.
#0, efes040t, 0000761b, «2968005, 00000017, 00000006
> eal ani)
‘Aton culbound packets rm te client to the server.
-
<1 192 1684 15, 30295, 212 150.141 5,29, 6?
<9, 492 168.415, 30235, 212 160.1445, 23,
‘low inbound packets from the server to the cent
EE
©, 712 150 141.5, 23, 102 1884 15, 20235, 7
9, 192.1884 18, 20235, 212 150.1815, 23,
‘Mow outbound packets tom the serves fo he cant
OTe ni SLRS eT
1,212 160.141 5,23, 192.1684 15, 90295, & 7
£0) 192.1684 18, 20235, 212.1501 5,23,
Figure 11 — Connections Table
‘The symbolic link format provides the “6-tuple” of the connection we want to
pass, and the arrow ig a pointer to the tuple of the real entry in the connection
table, The first 6 attributes in every entry in the connections table state the
‘connection’s “6 tuple”. The 6-tuple is « unique identification of the connection
‘within the system. The direetion can be either “O” for Inbound or “1” for
Outbound.
In the above slide, we see a simple connection representation in the connections
table, The first entry is the “Real Entry”, this entry holds all ofthe relevant
information for that traffic, such as state, sequence numbers, matching rule and
80 on. The entry allows the Client to Server (C28) packet to enter the firewall on
the inbound. The second entry is a symbolic link, allowing for the same packets
(C28) to enter the firewall on the outbound. The third entry is another symbolic
link, allowing for the Server to Client (S2C) traffic to enter the firewall on the
inbound. The last entry is also a symbolic link, allowing for the S2C packet to
center the firewall on the outbound.
34 Check Point Security Engineering‘Check Point Firewall Key Features
Check Point Firewall Key Features
Packet Inspection Flow
Before considering to debug firewall issues, let’s take a closer look at firewall
features that require some understanding, We've briefly touched on a few of
these already, but we won't cover all of them in depth in this chapter.
‘The Check Point Firewall Software Blade Key Features includes:
Packet Inspection Flow
* CoreXL (to be covered in detail in a later chapter)
Policy Installation
Network Address Translation
Security Servers
Let’s take a closer look at packet flow through the firewall kernel and examine
how the user-mode processes work fo control the traffic:
Figure 12— Packot Inspection
Suudent Manual
35Policy Installation Flow
1. The packet arrives at the Security Gateway, intercepted by the NIC on the
inbound.
2, The firewall kernel inbound chain begins inspecting the packet.
Once the packet is matched against the rule base, a log is generated and sent
fiom the kemel to the user-mode process, FWD, located in the Security
Gateway.
‘The FWD process on the Security Gateway, sends the log to FWD on the
‘Management Server, where itis forwarded to FWM via CPD.
5, FWM sends the log to the relevant SmartConsole application, such as
‘SmartView Tracker.
6, Atthe same time, depending on routing decisions made by the OS, except for
specific scenarios such as VPN routing, the packet is routed to a selected NIC.
But the packet must go through the Firewall kemel again, only this time
through the outbound chain to the appropriate NIC and to the network.
‘The graphic displays a general process flow for Policy installation, differences
are version specific, so $F WDIR is replaced with the compatibility package when
other products or versions are used.
low.
Figure 13 — Policy Installation
36
‘Check Point Security Engineering‘Ghack Point Firewall Kay Features
1. The policy is defined in the SmartDashboard GUI, ie, in the Firewall tab
2. When the policy is saved, a new file is created called SFWDIR/conf/*.W.
All the *.W files are stored in the rulebases_5_0.fws location.
3. fwm_gen compiles the SFWDIR/cont/*.W into a machine language creating
anew file called $FWDIR/cont!.pf.
‘The SFWDIR/conf/*.pfis actually the input from the SFWDIR/eont/*.W
and the SFWDIR/eonf/objects.C fie.
‘The SFWDIR/eont/*.W file is actually the exact same information defined in
the GUI, just ina text format instead of a graphic one.
‘The objects.C file contains information relevant to the policy installation
only, whereas the objects_5_0.C includes all the objects defined in the GUL
SFWDIR/conflobjects_5_0.C is stored on the Management Server, and is
‘important only to the Management Server.
SFWDIR/database/objects.C is relevant only to the Gateway.
Siudlent Manual 37‘Ravanced Firewall
Policy Installation Process
‘The process can be described as follows:
|Policy Installation
Ses
Figute 14 — Policy Installation Process
‘Initiation — Policy installation is initiated by the GUI or from the command
line, Information required for the policy installation is provided, such as the
list of gateways on which the policy isto be installed.
‘Verification — The information in the database is verified to comply with a
number of rules specific to the application and package, for which policy
installation is requested. If this verification fails, the process ends here, and an.
error message is passed to the initiator. The system can also issue wamings, in
addition to fail/success messages.
* Conversion — The information in the database is converted from its initial
‘format to the format understandable by later participants in the flow, such as
‘code generation and gateway.
+ Code generation and compilation — Policy is translated to the INSPECT
language and compiled with the INSPECT compiler. Also, some additional
data transformations are completed,
+ CPTA—The Check Point Policy Transfer Agent transfers the Policy to the
firewall gateway using SIC.
© Commit —- The Gateway is instructed to load the new policy.
Eg Check Point Security EngineeringPolicy installation Process Flow
Going back to the keel, let's examine how policy installation is handled by the
User-Mode processes.
Policy Install Process &
Figure 15 — Policy Installation Procass Flow
‘Student Manual ea‘avanced Firew
. The new poli
|. Assuming the initiation was made by a SmartConsole application, as opposed
to using command line options such as fwm load or fw fetch, the Check Point
‘Management Interface (CPMI) policy installation command is sent to FWM
‘on the Management Server where the verification and
compilation takes place.
FWM forwatds the command fo CPD for code generation and compilation,
CPD invokes the Check Point Policy Transfer Agent (CPTA) command which
sends the policy to all applicable Security Gateways.
CPD on the Security Gateway receives the policy and verifies i's integrity
. CPD on the Gateway updates all of the user-mode processes responsible for
‘enforcement aspects. These include VPND for VPN issues, FWSSD
processes for security server issues and so on. Once complete, the CPD then
initiates the kernel replacement.
is prepared, and the kernel halts the trafic and starts queuing,
all incoming traffic,
7. The Atomic load takes place. This process should take a fraction of a second.
8, The Queue is released and all of the packets are handled by the new policy.
Note: Additional steps may be included for debugging purposes.
Teck Polat Security Bngaaringwar
NAT
How NAT Works.
"Network Address Translation (NAT) and Network Address Port Translation
(NAPT) are the two primary technologies traditionally used as methods to:
+ Hide networks so that actual IP addresses are not revealed or required to be
publicly routable. This reduces the need for more publicly routable IPs.
* Allow access to intemal (sometimes, non-routable) resources from an
external network,
When referring to NAT in the firewall context, itis not only meant in the
traditional sense, but to regard NAT as an infrastructure of services used, for
‘example, to create clustering solutions, security servers, office mode connections,
ete
Infiastructure [© INSPECT rules and tables
+ Performed on the fist packet
Features + NAT ule base is efficient
© Dual NAT (Automatic rules)
+ Rule Priorities
When NAT is defined on a network object, NAT rules are automatically added to
the NAT Rule Base, Those are called Automatic NAT rules, NAT is translated
uring policy installation to tables and performed on the first packet of the
connection. The NAT rule base is very efficient and can match two NAT rules on
same connection; this is called bi-directional NAT and only applies for
Automatic rules.
Note: Even though NAT merges two automatic NAT rules into one,
as described above, this featured may be disabled and NAT
rules may be manually defined for additional options.
NAT rules are prioritized first match manual/pre-automatic NAT rules, then
‘automatic NAT rules (static NAT first, followed by Hide NAT) then post-
automatic manual NAT rules.
Student Manual
a‘avanced
wrowall
Hide NAT Process
‘Consider first the original packet. When the packet arrives af the inbound
interface, itis inspected by the Security Policy. If accepted, the packet is entered
into the connections table. The first packet of the connection is matched against
NAT rules. The packet is translated if'a match is found. Then the packet arrives at
the TCP/IP stack of the Firewall Module machine, and is routed to the outbound
interface.
fous ces Na) (RRR woot T08T|
Caneaba Ta
[o[ moor aos | tose [ov _[s
vo4s226 omen | 1914101 ¢
swotsie1 | 20 | tons21254 0023 |6
vwoteio1 [eo | rooos $05 [6
0,14 32.1.254,6,10022,10023 | 494.39.1.254,6.10023
Figura 16 — Hide NAT
During the NAT rule base traversal, both NAT source and destination are
decided, However, they are actually performed at the appropriate locations:
© sre mat on the server side
+ dst nat depending on the relevant GUI property
‘The Reply packet arrives at the inbound interface of the firewall machine. The
‘packet is passed by the Security Policy since itis found in the connections table.
‘The packet's destination, which is the source of the original packet, is translated
according to the NAT information. This takes place when the packet was
{translated in the frst initial connection. ‘The packet arrives at the TCP/P stack of
the firewall machine, and is routed to the outbound interface. The packet goes
through the outbound interface, and its source, the destination of the original
packet, is translated according fo the information in the NAT tables. The packet
leaves the firewall machine.
@
‘Check Point Security Engineering‘Security Servers
WAT
Another important feature of the Check Point firewall, Security Servers are 2
necessary and crucial element to firewall functionality, Some firewall features
require a higher layer protocol enforcement such as the application layer. In
‘addition, authentication schemes such as User, Client and Session authentication
requires that the firewall maintain the connection during the user session, so that
processes must be maintsined and monitored. To accomplish this, the firewall
‘cts as a proxy (only for user authentication) and the user-mode processes are
‘employed to manage this activity.
Note: When Identity Awareness is deployed, this process is operates
differently,
How a Security Server Works
Essentially, when a client initiates a connection to a server, the firewall kemel
signals the FWD process using a trap. FWD spawns the FWSSD child service,
which runs the security server. Then, the security server binds to a socket and
‘manages the connection,
FWD waits for connections on the ports of other servers (daemons), and starts the
corresponding server when the connection is made. FWD also talks to its children
processes on other servers using a pipe and by using signals.
In the file structure, the real_port is the port being bound to. IF ‘real_port’ is 0, 8
high random port will be assigned. The SFWDIR/confifwauthd.conf file
structure is as follows:
Student Manual‘Ravanced Firewall,
Basic Firewall Administration
In addition to understanding the Firewall kemel structure, itis important to
familiarize yourself about configuration file structure slong with commands
typically used for troubleshooting problems. To begin with, lets consider how the
firewall configuration files are broken down. The main sub-grouping of
configuration files are divided into directories located under /opt,
© CPsulte-R77 — Manages firewall modules (R70 - R77). CPsuite is the
generic installation
© CPshrd-R77— Stores what used to be called SVN foundation including
CPD database, licenses, registry and generic low level Check Point
infrastructure. (not version related)
© CPysxngxemp — For managing VSX
© CPedgeemp — For managing Edge devices
In addition, the lib and /eonf directories store definitions files important to take
into consideration, For instance, the SFWDIRMib/*def files include rulebase
and protocol definitions. Users definitions are stored in $F WDIR/conf/
fwauth.NDB, and security server configuration settings are stored in $FWDIRY
confifwauthd.cont,
SEWDIR/conficlasses.C defines fields foreach object used in the objects 5_0.C
file, such as color, num/string, and default value, Though the SFWDIR/
database! directory on the Management Server has no relevancy, this directory is
particularly noteworthy on the gateway itself, where specific object entries are
stored for that particular gateway. SFWDIR/conf/ on the Management Server is
also not relevant, but SFWDIR/lib/*.de isnot important on the gateway.
“There are two ways to view and edit database files such as these.
‘© dbedit — A command line utility on the Management server itself.
© GUldbedit.exe — A executable tool located on the Windows-based GUI
client machine under:
C:\Program Files\CheckPoint\SmartConsole\R75\Program.
”
‘Check Point Security EngineeringCommon Commands
Siudent Mamuat
Wat
Note the following commonly used commands in troubleshooting gateways:
+ epconfig — Used to run a command line version of the Check Point
Configuration tool, and to configure or reconfigure a Security Gateway/
‘Management installation,
© eplic print — Located in $CPDIR/bin, this command prints details of Check
Point licenses on the local machine. Cplic print -x prints the licenses with
signatures and eplic del deletes a license.
© epstart — This command is used to start all Check Paint processes and
applications running on a machine.
+ epstop — This command is used to terminate all Check Point processes and.
applications, running on a machine.
‘The commands epstop and epstart are actually calling fwstop and fwstart
scripts for all Check Point product, including the firewall stop/statt scripts
located in $FWDIR/bin, These are scripts that actually run when you perform
cepstop, epstart and eprestart with different flags. Cprestart is an “internal”
command used for DAIP (Dynamically Assigned IP devices) such as Edge
devices. Not all CP processes are actually brought down when you use eprestart,
so always use epstop and epstart, and not eprestart,
eB‘Ravanced Firewall,
FW Monitor
What is FW Monitor?
46
‘As an aid to understanding the Firewall “under-the-hood” and developing good
debugging skills, the Check Point tool, FW Monitor is key ancl essential in packet
capture and firewall traffic analysis,
Note: Check Point recommends turning off SecureXI. (fwaccel off)
when using fw monitor.
EW Monitor is a packet analyzer tool available on every Check Point Security
Gateway. It provides kernel evel inspection but will not nin in promiscuous
mode, FW Monitor works for layers 3 and above in the OSI network layer stack,
‘The syntax is the same regardless ofthe platform, and supports the.CAP output
format used in Ethereal and Wireshark packet analyzer tools.
Figure 17 — FW Monitor
Check Point Security Engineeringras FW itonitor
C2S Connections and $2C Packets
FW Monitor captures packets as they enter and leave the firewall kemel and
‘when the packet enters and leaves the inbound and outbound chains respectively.
In the case of client to server communication, a client designated as Host!
according to the poticy sends traffic destined for a Web server located behind the
firewall. Since the traffic is permitted passage through the firewall based on the
policy nulebase, the packet must traverse and be inspected by both chains of the
firewall
Operating
System
Kernel
Firewall
Kernel
i
}
_K
Figure 18 —28 and $20 Connections
FW Monitor works by loading a special INSPECT filter to filter out interesting
packets. This filter is different from the INSPECT filter used to implement a rule
base. Where the rule base determines which packet is accepted, rejected, or
dropped, the INSPECT filter generated by fw monitor simply captures kernel
packet flows. You can capture everything through the kemel using fw monitor,
even a particular type of traffic or source.
(Once fw monitor is executed, the specified INSPECT filter is compiled and
loaded to the kemel. Any parameters following “accept” in the fw monitor
command will be displayed by fw monitor. The same filter is executed on all,
interfaces in all directions.
Siudent Manual‘Ravenced Firewall
‘The fw monitor output uses specific expressions to explain the location of the
packet as it moves through the firewall. There are four inspection points as a
packet passes through the kernel (or virtual machine)
i — Before the virtual machine, in the inbound ditection
(pre-inbound)
I — After the virtual machine, in the inbound.
(post-inbound)
(0 — Before the virtual machine, in the outbound direction
(pre-outbound)
(© — After the virtual machine, in the outbound direetion
(post-ourbound)
In our client to server scenario, “i” represents the packet as it left the client. The
“P represents the packet already checked against the tables and rule base. In case
of Static NAT, the destination IP address will be changed, The “o' means the
packet is before the outbound kemel (same as ‘I), and *O" means the packet is in
the outbound kernel chain, as it will appear at the Web server. In the case of Hide
NAT, the source IP address will be different here.
For packets traveling from server to client, the inspection points are just the
reverse, where ‘I’ could be the NAT’ed packet on its way out of the inbound
chain in the firewall in the case of Static NAT. At this point, the packet has
already been checked by the tables and rule base. The *O" is the packet as it will
appear to the client.
fw monitor
Ina busy system, running fw monitor without any filters can create a great detail
‘of output, and makes the analysis dificult. Filter expressions are available used
to specify packets to be captured and limit the amount of output. The general
syntax is:
fu monitor -e “accept ;”
eB ‘Cheek Point Security BugineeringSee
‘Practice and Roviow
Practice and Review
Practice Lab
Lab 2: Core CLI Elements of Firewall Administration
Review Questions
4. The core process CPD provides what main fanetions?
2. The firewall’s kernel consists of two completely separate logical parts repre-
senting the process of a packet coming into and out from the firewall, these
are referred to as.
Shudent Manwal ®‘avenced Firewall,
50 ‘Check Point Security EngineeringCHAPTER 3
Clustering and
Acceleration
Student Maral
SLeee eee eee
‘Clustering and Acceleration
Clustering and Acceleration
Whether your preferred network redundancy protocol is Check Point ClusterXL,
technology ot standard VRRP protocol, it is no longer a “platform choice” you
will have to make with Gaia, Both ClusterXL and VRRP are fully supported by
Gaia, and Gaia is available to all Check Point Appliances, open servers and
virtualized environments, There ere no more trade-off decisions between
required network protocols and preferred security platforms/functions..
Objectives
* Build, test and troubleshoot a ClusterXL Load Sharing deployment on an.
enterprise network,
Build, test and troubleshoot a ClusterXL High Availability deployment on an
enterprise network,
‘© Build, test and troubleshoot a management HA deployment on an enterprise
network,
‘© Configure, maintain and troubleshoot SecureXL and CoreXL acceleration
solutions on the corporate network traffic to ensure noted performance
‘enhancement on the firewall.
© Build, test and troubleshoot a VRRP deployment on an enterprise network.
52 ‘Check Point Security EngineeringVRRP
VRRP
VRRP vs ClusterXL.
‘VRRP (Virtual Routing Redundancy Protocol) isa cluster solution where two or
‘more Gais-based Security Gateways work together as one Security Gateway, You
‘can configure your VRRP cluster for high availability or load sharing.
‘The Virtual Router Redundancy Protocol (VRRP) eliminates the single point of
failure, while maintaining a single router's ease of administration, VRRP enables
additional routers to take over the role of a failed first hop router, helping them to
avoid becoming the single point of failure for netwark services.
‘The Check Point implementation of VRRP includes additional functionality
called Monitored Circuit VRRP. Monitored-Circuit VRRP prevents “black holes”
caused by asymmetric routes created when only one interface on master router
fails (as opposed to the master itself). Gaia releases priority overall interfaces on
2 virtual router (0 let failover occur.
‘You cannot deploy a standalone deployment (Security Gateway and Security
Management server on the same computer) in a Gaia VRRP cluster.
VRRP and ClusterXL are mutually exclusive, you ean use either, but not both at
the same time.
Advantages of using ClusterXL
(ClusterXI. provides high availability and load sharing. It distibutes traffic
between clusters of redundant gateways so that the computing capacity of
‘multiple machines may be combined to increase total throughput. Ifan individual
gateway becomes unreachable, all connections ate redirected to a designated
backup without interruption. Tight integration with Check Point management and
enforcement points ensures simple deployment.
+ Transparent failover
+ Higher performance
© Easy deployment
+ Costeffective
Advantages of using VRRP:
‘+ Minimizes failover time (Black Holes) and bandwidth overhead when a
primary router becomes unavailable.
Student Manual
33Clustering and Acceleration
34
* VRRP supports up to 255 virtual routers (VRRP Groups) on a router physical
interface, subject to the platform supporting multiple MAC addresses.
'* Minimizes service disruptions during failover.
‘© Provides for election of multiple virtual routers on a network for load sharing,
‘+ Addresses failover problems at the router level instead of on the network.
edge.
‘+ Avoids the need to make configuration changes in the end nodes if gateway
router fails
‘+ Eliminates the need for router discovery protocols to support failover
‘operations,
‘© Functions over a wide variety of multi-access LAN technologies capable of
supporting IP traffic.
Ilustrated is a simple VRRP configuration, where Platform A is the Master, and.
Platform B is the backup.
Platform A Platform B
192.168.2.1 - 192.168.2.2
rib 182!
Host H1 Host H2 Host H3 Host H4
Figure 19 — Simple VRRP
AVRRP router (a router that is running VRRP) might participate in more than.
‘one VRID. The VRID mappings and priorities are different for each VRID. You
can create two VRIDs on the master and backup platforms. One VRID for
‘connections with the extemal network, and one for connection with the intemal
network.
Check Point Security EngineeringStudent Manat
VRRP
This next diagram shows VRRP Configuration with Internal and External
VRIDs.
In this example, Platform A acts as the master for VRID 1 and VRID 2, while
Platform B acts as the backup for VRID 1 and VRID 2
Internet
|
Public Network
‘VRID 1 Haste VRID { Backup
Platform A ey) Platform B
192.168.2.1 192.168.2.2
VRID 2 Master \vRID 28ackup
Internal Network
Host H1 Host H2 Host H3, Host Ha
Figure 20 — VRRP Participation in More Than One VRID
‘You can configure some platforms to be part of multiple VRIDs while they
simultaneously back up each other. This is known as an active-active
configuration,
In this next active-active configuration, two VRIDs are implemented on the
internal network for load sharing. Platform A is the master for VRID 5, and is the
‘default gateway for Host HI and Host H2. Platform B is the master for VRID 7,
and is the default gateway for Host H3 and Host H4. Platforms A and B are
‘configured to back each other up
58‘Clustering and Acceleration
Ifone platform fails, the other takes its VRID and IP addresses. It supplies load
bolancing, full redundancy, and uninterrupted service to the default IP addresses.
Platform A Platform B
192.168.2.1 192.168.2.2
(No iain Rw Baatlag
Baga adaress 920825 ‘sup adress 102 16825
Presly2st Pret 253.
I I
as ‘RIO 7 aciee
Sacupadras 192 10827
Prony 2
Host 1 Host H2 Host H3 Host Ha
Defaut Gateway Defaut Gateway Default Gateway Cefault Gatoway
wo2i625 102.6825" toztes27 —102.16827
Figure 21 — Multiple VIRDS in Active-Active Configuration
VRRP Configurations
‘You can configure VRRP using one of these procedures:
4. VRRP (Simple Monitored Circuit VRRP)
‘The simple Monitored Circuit VRRP configuration contains all of the basic
parameters and is applicable for most environments.
2 Advanced VRRP - use this procedure if you are working with:
= A system on which VRRP has already been configured using this method.
= An environment where itis necessary to monitor each interface individually.
= You can change the VMAC (Virtual MAC Address) assignment mode.
‘The advanced VRRP requires users to manually configure a virtual router for
each monitored interface
‘You cannot use the easy and advanced procedures to configure Monitored-
Circuit VRRP on the same computer.
56 Check Point Security EngineeringvaRP
Monitored Circuit VRRP.
Troubleshooting VRRP
Monitored-circuit VRRP climinates “black holes” caused by asymmetric routes
that can be created if only one interface on the master fails (as opposed to the
entire platform). Gaia does this by reducing priority overall of the interfaces in
the virtual router to allow the baclaup to take over entirely.
you are using standard VRRPv2 and the external interface fils or becomes
unreachable, the extemal virtual router fils over to the backup while the intemal
virtual route stays onthe master. This can result in reachability failures, as the
platform might accept packets from an intemal end host but be unable to forward
them to destinations that are reached through the failed interface to the exteral
network
Monitored-ircut VRRP monitor ll ofthe VRRP-configured interfaces on the
platform. Ifsn interface fails, the master releases its priority overall ofthe
‘VRRP-configured interfaces. This allows the backup platfrm to take over al of
the interfaces and become master for both th intemal and external VRID.
“To release the priority, Gaia subtracts the priority delta, « Check Point-specific
parameter that you configure when you setup the VRID, fom the priority to
caloulate an effective priority. If you configure your system correctly, the
effective priority is lowe than that of the backwp routers and, therefore, the
VRRP election protocol i triggered to select a new master
‘You can log information about errors and events for troubleshooting VRRP by
cnabling traces for VRRP.
‘To enable traces for VRRP:
4. Inthe WebUI tre, select Routing > Routing Options.
2 Inthe Trace Options section, inthe Filter Visible Tables Below drop down
list, select VRRP.
3. Inthe VRRP table, select an option, and click Activate
‘The system restarts the routing subsystem and signals it to reread its
configuration. The option you selected, its name and On/Off radio buttons show
fon the page.
If VRRP failover does not eccur as expected, make sure of the configuration of,
these items,
© Allrouters of @ VRRP group must have the same system times. The simplest
‘method to synchronize times is to enable NTP on all nodes of the VRRP
Student Manual
7——
‘Clustering and Acceleration
‘group. You can also manually change the time and time zone on each node to
match the other nodes, It must be no more than seconds apart
© Allrouters ofa VRRP group must have the same Hello Interval
© The Priority Delta must be sufficiently large for the Effective Priority to be
ower than the backup router, Otherwise, when you pull an interface for a
Monitored-Cireuit VRRP test, other interfaces do not release IP addresses.
You can use different encryption accelerator cards in two appliances of one
VRRP group oF IP cluster (such as the Check Point Encrypt Card in one
appliance, and the older Check Point Encryption Accelerator Card in a
different appliance). When you do, select encryption/authenticatior
algorithms supported on the two cards. Ifthe encryption/authentication
algorithm is supported on the master only, and you use NAT, tunnels failover
incorrectly. Ifthe encryption/authentication algorithm is supported on the
master only, without NAT, tunnels are not accelerated after failover,
© VRIDs must be the same on all routers in a VRRP group. If you use
Monitored-Cireuit VRRP, make sure all platforms of one virtual IP address
use the same VRID.
© The VRRP monitor in the WebUI might show one of the interfaces in
initialize state. This might suggest that the IP address used as the backup
address on that interface is invalid or reserved.
‘+ SNMBP Get on Interfaces might list the incorrect IP addresses. This result
incorrect Policy. An SNMP Get (for the Firewall object Interfaces in the GUI
Security Policy editor) fetches the lowest IP address for each interface. If
interfaces are created when the node is the VRRP master, the incorrect IP
address might be included. To repair this problem, edit the interfaces by hand
iff necessary.
Firewall Policies
If your platforms run firewall software, you must configure the firewall policies
to accept VRRP packets. The multicast destination assigned by the IANA for
VRRP is 224.0.0.18. Ifthe policy does not accept packets to 224 0.0.18, firewall
platforms in the same VRRP group take on Master state
Monitored-Circuit VRRP in Switched Environments
Monitored-Cireuit VRRP, some Ethemet switches might not recognize the
VRRP MAC address after a master to backup change. This is because many
switelies cache the MAC address related tothe Ethernet device attached to a por.
When the change to a backup router occurs, the MAC address for virtual router
shifts to a different port. Switches that cache the MAC address might not change
to the conect port during a VRRP change.
58.
Check Point Security EngineeringVRRP
‘To repair this problem, you can take one of the these actions
» Replace the switch with a hub,
© Disable MAC address caching on the switch, or switch ports
that the security platforms are connected to,
Itmight be not possible to disable the MAC address caching. Ifso, set the address
‘aging value sufficiently low that the addresses age out each second or two. This
ccauses more overhead on the switch. Therefore, find out if this isa viable option
for the model of switch you ran,
‘The Spanning Tree protocol prevents Layer 2 loops across multiple bridges.
‘Spanning-Tree can be enabled on the ports connected to the two sides ofa VRRP
pair. Itcan also see multicast Hello Packets come for the same MAC address
from two different ports. When the two occur, it can suggest a loop, and the
switch blocks trafic from one port. Ifa port is blocked, no security platforms in
the VRRP pair can get Hello Packets from the other. In this instance, the two of
them enter the master router state.
Enable PortFast on the ports connected to the VRRP pair. PortFast causes a port
to enter the Spanning-Tree forwarding state immediately, by passing the listening
and leaming states. The command to enable PortFast is set spantree portfast 3/1-2
‘enable, where 3/1-2 refers to slot 3, ports | and 2,
Student Manat
59)‘Clustering and Acceleration
Clustering and Acceleration
‘The Check Point Acceleration and Clustering Software Blade grants two features
-load-sharing modes of ClusterXL (unicast/pivot and multicast), and SecureXL.
that work together to maximize performance and security in high-performance
environments. These work with CoreXL, which is included with the software
blade containers, to form the foundation of the Open Performance Architecture,
which delivers throughput designed for data center applications and the high
levels of security needed to protect against today’s application-level threats.
Note: The Acceleration and Clustering Software Blade is NOT
required for ClusterXL HA and VRRP.
corre twa
SS—
“ys ok
Figure 22 —custoring
60
‘Check Point Security EngineeringClustering Terms
‘Clustering and Accel
Check Point uses the following terms when discussing clustering;
+ Active Up —When the High Availability machine that was Active and
suffered a failure becomes available again, it returns to the cluster, not as the
Active machine but as one of the standby machines in the cluster.
© Critical Device — A device that the Administrator has defined to be critical
to the operation of the cluster member. A critical device is also known as a
Problem Notification (pnote). Critical devices are constantly monitored, If
critical device stops functioning, this is defined as a failure. A device can be
hardware or a process. The £wd and ephad processes, as well as the Security
Policy itself are predefined by default as critical devices. The Administrator
can add to the list of critical devices using the cphaprob command.
+ Failure — A hardware or software problem that causes a machine to be
unable to filter packets. A failure ofan Active machine leads toa Failover
* Failover — A machine taking over packet filtering in place of another
‘machine in the cluster that suffered a failure.
+ High Avaitabtity (LA) — The ability to maintain aconnestion when there is
4 failure by having another machine in the cluster take over the connection,
without any loss of connectivity. As opposed to Load Sharing, inthis ease,
only the Active machine filters packets. One ofthe machines inthe cluster is,
configured as the Active machine. Ifa failure occurs on the Active machine,
‘one of the other machines inthe cluster assumes its responsibilities
‘+ Hot Standby — Also known as detive/Standby. It has the same mesning as
High Availability
+ Cluster Controt Protocol — Cluster Control Protocol or CCP is used
specifically for Clustered environments to allow for gateways to report their
‘own states and lear about the states of other members in the cluster. Tt isthe
«essential means by which State Synchronization works, in order to provide
failover inthe event an active member goes down,
‘There is no need to add a rule to the Rule Base that accepts CCP. When clustering
is configured on the gateways, an implied rule is created making this provision,
‘State Synchronization traffic typically makes up around 90 percent of all Cluster
Control Protocol (CCP) traffic. State Synchronization packets are distinguished
from the rest of CCP traffic via an opcode in the UDP data header.
Student Manual
61eee
“Clustering and Accateration
ClusterxXL
|As a network and security professional, you are often required to consider the
needs of an organization and weigh them against available resources, to provide
the most cost effective solution. Often this requires addressing risk management
‘without significantly increasing cost. A direct result from tisk assessments is
often the concem for hardware backups and resource utilization due to increasing
network traffic, To address this, we will look at the clustering and acceleration
solutions provided by Check Point, how they should be implemented into the
working network, and how to troubleshoot issues whenever they occur.
Ensuring that Security Gateways and VPN connections are kept alive in a
corporate network is critieal to maintain “business as usual”. The failure of a
‘Security Gateway or VPN connection can result in the loss of active connections
‘and access to critical data, As a network security expert, itis your job to maintain
the dependability of these business-critical devices.
(ClusterXL supplies an infrastructure that ensures that no data is lost in case of a
systein failure. Essentially, a cluster is a group of identical security gateways
‘connected in such a way that if one fails, another immediately takes its place.
‘Check Point ClusterXL provides both Load Sharing as well as High Availability
solutions.
‘© High Availability ensures gateway and VPN redundancy for transparent
failover between machines.
© Load Sharing provides reliability and enhances performance because all,
cluster members are active
ClusterXL must be installed in a distributed configuration in which the Security
Management server and the cluster members are on different machines.
ClusterXL is part of the standard Security Gateway instalation.
Both the plug-and-play and the evaluation licenses include the option to work
with up to three ClusterXL Load Sharing clusters managed by the same Security
‘Management server.
ClusterXI. supported platforms are listed in the platform support matrix, which is
available online at:
http: //support. checkpoint .com
‘ClusterXL uses unique physical IP and MAC addresses for the cluster members
and virtual IP addresses to represent the cluster itself. Virtual IP addresses do not
belong to an actual machine interface.
62 ‘Check Point Security Engineering‘Clustoring and Acceleration
‘When using ClusterXL, ensure that you synchronize the clocks of all of the
cluster members. You can synchronize the clocks manually or using NTP.
Features such as VPN function properly only once the clocks of all of the cluster
members are synchronized,
Cluster Synchronization
In order to make sure each gateway cluster member is aware of the connections
going through the other members, a mechanism called State Synchronization
‘exists which allows status information about connections on the Security
Gateways to be shared between the members.
‘State Synchronization enables all machines in the cluster to be aware of the
‘connections passing through each of the other machines. It ensures that if there is
a failure in a cluster member, connections that were handled by the failed
‘machine will be maintained by the other machines.
Every IP based service, including TCP and UDP, recognized by the Security
Gateway is synchronized.
‘State Synchronization is used both by ChisterXL and by third-party OPSEC-
certified clustering products.
State Synchronization works in two modes:
© Full synchronization — transfers all firewall kemel table information from
one cluster member fo another. It is handled by the £wd daemon, using an
‘encrypted TCP connection,
© Delta synchronization — transfers changes in the kemel tables between
cluster members. Delta sync is handled by the firewall kemel, using UDP
snulticast or broadeast on port 8116.
Full synchronization is used for initial transfers of state information, for many
thousands of connections. Ifa cluster member is brought up after failing down, it
‘will perform full sync. Once all members are synchronized, only updates are
transferred via delta syne. Delta sync is much quicker than full syne.
Running ephastart on a cluster member activates ClusterXL on the member. It
does not initiate full synchronization. cpstart is the recommended way to start &
cluster member. Running ephastop on a cluster member stops the cluster member
from passing trafic. State synchronization also stops. Its still possible to open
‘connections directly to the cluster member. These commands should only be run
by the Security Gateway, and not directly by the user.
Student Manual
63—
‘Clustering and Acceleration
Synchronized-Cluster Restrictions
‘The following restrictions apply to synchronizing cluster members:
* Only cluster members running on the same platform can be synchronized.
© The cluster members must be of the same software version.
‘* A User Authenticated connection through a cluster member will be lost if the
cluster member fails. Other synchronized cluster members will be unable to
resume the connection, However, a Client Authenticated ot Session
Authenticated connection will not be lost.
‘The User Authentication state is maintained on Security Servers, which are
processes, and thus cannot be synchronized on different machines in the way
that kernel data can be synchronized. However, the state of Session Authenti-
cation and Client Authentication is stored in kemel tables, and so can be syn-
chronized,
© The state of connections using resources is maintained in a Security Server, so
these connections cannot be synchronized for the same reason that User
‘Authenticated connections cannot be synchronized.
Accounting information is accumulated in each cluster member and reported
separately to the Security Management Server, where the information is
aggregated. In case of a failover, accounting information that was
accumulated on the failed member but not yet reported to the Security
‘Management Server is last. To minimize the problem, itis possible to reduce
the period in which accounting information is flushed. To do this, in the
cluster object's Logs and Masters > Additional Logging window, configure
the attribute Update Account Log every.
Securing the Sync Interface
Since the synchronization network carries the most sensitive Security Policy
information in the organization, it is critical to protect it against both malicious
and unintentional threats. Check Point recommends securing the synchronization
interfaces either by.
* Using a dedicated syne network
© Connecting the physical network interfaces of the cluster members directly
using a cross-over cable, In a cluster having three or more members, us a hub
or switch,
oa Check Point Security Engineeringes
‘Clustering and Accsleration
To Synchronize or Not to Synchronize
In general, all connections on a cluster are synchronized between members, with
1 few exceptions. You may choose not to synchronize certain types of
connections, either because:
‘+A significant load on the network is caused by the use of a particular service.
+ Asservice may open many short connections, whose loss may not be very
important, or even noticed, ic., DNS (over UDP), HTTP.
* Bi-directional stickiness (to be discussed later in this chapter) is employed for
all connections, .., LS mode with no VPN or static NAT, some OPSEC
clusters.
For all TCP services whose protocol type is HTTP or None, you can configure
the Security Gateway to delay a connection 50 that it will oly be synchronized if
it still exists after the connection is initiated for x seconds. This capability is only
available if a SecureXL-enabled devices is installed on the gateway to which the
packet passes. (SecureXL will be covered later in this chapter.)
Student Manvat
65ee
‘Clustering and Acceleration
ClusterXL: Load Sharing
Multicast Load Sharing
Unicast Load Sharing
In a Load Sharing Gateway Cluster, all cluster members are active, soit brings
significant performance advantages. Using multiple gateways instead of a single
gateway increases linear performance for CPU intensive applications such as,
VPNs, Security servers, Policy servers, and User Directory (LDAP).
‘There are two available modes which work in a Load Sharing deployment:
= Multicast
© Unicast
Machines in a ClusterXL Load Sharing configuration must be synchronized.
Machines in a ClusterXL High Availability configuration do not have to be
synchronized, but connections will be lost upon failover if they are not,
In ClusterXL's Load Sharing Multicast mode, every member of the cluster
receives all ofthe packets sent to the cluster IP address. When a router or Layer 3
switch forwards packets to all ofthe cluster members using multicast, a
ClusterXL decision algorithm on all cluster members decides which cluster
‘member should performa enforcement processing on the packet. Only that
1e processes the packet, and sends the packet fo its destination; the other
‘machines drop the packet.
Only routers or layer 3 switches that accept a multicast MAC address as a
response to an ARP request with a unicast IP address are supported for multicast
load sharing.
In ClusterXL's Load Sharing Unicast mode, one machine, called the Pivot,
receives all traffic from a router with a unicast configuration and redistributes the
packets to the other machines in the cluster. The Pivot machine is chosen
automatically by ClusterXL.
‘The Pivot is the only machine that communicates with the router. In this scheme,
the router uses only the Pivat's unicast MAC address to communicate to the
cluster,
‘The Pivot functions as a cluster router, both from the intemal network outwards,
‘and vice versa. This functionality also applies (o DMZ networks.
66
Check Point Security EngineeringSee
(Clusterxt: Load Sharing
‘After the Pivot first receives the packet from the router or switch, the Pivat's
Load Sharing decision function decides which cluster member should handle the
packet, This decision function is made in a similar fashion to the regular
multicast Load Sharing decision. The Pivot may also decide to handle the packet
itself. In such a case, Pivot Load Sharing will hand the packet to the Pivot's
Firewall component for processing,
Because the Pivot is busy distributing traffic, the Pivot participates to a lesser
extent in the actual load sharing function. The other cluster members take on
more traffic load, Since the Check Point Pivot Mode feature is based on unicast,
addresses only, it can work with all routers and Layer 3 switches.
How Packets Travel Through a Unicast LS Cluster
‘When the router fitst sends a packet through the cluster, the following accurs:
Unicast Packet Path
Boone
aaa
“pert
Bom
Figure 23 — Unicast Packet Path
Student Manual 67————————
‘Clustering and Acceleration
Sticky Connections
4. ‘The router sends an ARP request for the cluster IP address.
2. The Pivot returns an ARP reply, with its own unicast MAC address, to the
router
3, The router sends the packet to the Pivot.
4. The Pivot forwards the packet to the designated cluster member, without
changing the packet. The destination IP address of the packet remains
‘unchanged, and neither decryption nor NAT functionality is performed on the
forwarded packet. When sending the packet, the Pivot uses the MAC address,
of the designated cluster member. The packet is forwarded through the
original interface
5, The cluster member that receives the forwarded packet perforins the
inspection, and sends the packet to its destination,
‘The return packet goes through the same process, although it may not
necessarily be forwarded by the Pivot to the same cluster member. The
process of the return packet is as follows:
1, The retum packet first reaches the Pivot, which assigns the cluster member
to handle the packet.
b, The packet is forwarded to the cluster member for Security Gateway
ingpection.
. The cluster member sends the packet to its destination,
‘A connection is sticky when all of its packets are handled, in either direction, by
‘ single cluster member. This is the case in High Availability mode, where all
‘connections are routed through the same cluster member.
In Load Sharing mode, there are cases where itis necessary to ensure that a
‘connection that starts on a specific cluster member will continue to be processed
by the same cluster member in both directions. To that end, certain connections
‘can be made sticky by enabling the Sticky Decision Function.
The Sticky Decision Function
‘The Sticky Decision Function enables certain services to operate in a Load
Sharing deployment, For example, itis required for L2TP traffic, or when the
cluster isa participant in a site-to-site VPN tunnel with a third-party peer.
‘The following services and connection types are supported by enabling the
Sticky Decision Function:
68
Cheek Point Security Engineering—
(ClusterXL: Load Sharing
Student Manat
© VPN deployments with third-party VPN peers
* Endpoint Connect/SSL Network Extender encrypted connections
‘The Sticky Decision Function is not supported when employing either
Performance Pack or a hardware-based accelerator card. Enabling the Sticky
Decision Function disables these acceleration products,
‘When the Sticky Decision Function is used, cluster members are prevented from
‘opening more than one connection to a specific peer. Opening another connection
‘would cause another SA to be generated, which a third-party peer would not be
able to process in many cases.
69‘Clustering and Acestoration
‘Maintenance Tasks and Tools
“The following covers topics relevant to an administrators’ everyday maintenance
of a clustered environment.
Perform a Manual Failover of the FW Cluster
‘The best practice method for initiating a failover administratively in a controlled
manner (not failure testing) isto run the following command on an active cluster
member:
cphaprob -d STOP -s problem -t 0 register
‘The command actually ereates a problem notification entry, with no refresh time,
in a problem state, This will put the current machine into a problematic state,
Running the command ephaprob List on this machine will show an entry
named STOP.
‘To remove the problematic “STOP” entry from the cluster member, un the
following command:
cphaprob -d STOP unregister
‘The above is a way of quickly and efficiently generating a gratuitous ARP from
the cluster.
Another way is via the command:
SEWDIR/bin/clusterXt_admin
Performing this command (SEWDIR/bin/clusterXt_admin down) onan
active cluster member will initiate a failover to the standby cluster member.
‘Make sure to perform $FWDIR/bin/clusterXb_admin up to normalize
the environment.
Note: A manual failover can also be induced from the
Gateways Status sereen in SmartView Monitor via “Stop
Cluster Member..”.
70 Check Point Security Engineering‘Maintenance Tasks and Tools
Advanced Cluster Configuration Examples,
Example 1-Seting CCP to use Broadeast
‘The ClusterXL Control Protocol (CCP) on the cluster members uses multicast by
default, because it s more efficient than broadcast Ifthe connecting switch is
incapable of forwarding multicast traffic, it is possible, to change the CCP mode
to broadcast. To change the CCP mode to broadcast, run the following command:
ephaconf set_cep broadcast
‘To change back to multicast run the following command:
cphaconf set _cep multicast
‘This traffic will be on UDP Port 8116.
‘This will survive a reboot. But as a precaution, the command needs to be added to
Jete/re. local file.
For verification, the command 'cphaprob -a if can be executed.
For Verizon Wireless, ClusterXL CCP must be set to BROADCAST mode.
Example 2 - Multicast MAC Addresses
‘To find out the multicast MAC address of a cluster, run command ophacont
debug_data on the Security Gateway.
‘The output of this command is written to /var/1og/messages under the
Multicast table section on each cluster member
Student Mana
n‘Clustering and Acesteration
Management HA
‘The Security Management server consists of several databases with information
on different aspects of the system, such as objects, users and policy information,
This data changes each time the system administrator makes modifications to the
system. Its important to maintain a backup for this data, so that crucial
information is not permanently lost in the event of Security Management Server
failure.
Moreover, ifthe Security Management server fails or is down for administrative
purposes, a backup server needs to be in place in order to take over its activities.
In the absence of the Security Management Server, essential operations
performed by the gateways, such as the fetching of the Security Policy and the
retrieval of the CRL, cannot take place.
In Management HA, the Active Security Management server (Active SMS)
always has one or more backup Standby Security Management servers (Standby
SMS) which are ready to take over from the Active SMS. These SMS must all be
of the same Operating System and version. The existence of the Standby SMS
allows for crucial backups to be in place:
Ina Management HA deployment, the first installed SMS is specified as the
Primary Security Management server. This is a regular SMS used by the system.
administrator to manage the Security Policy. When any subsequent SMS is
installed, these must be specified as Secondary SMS. Once the Secondary SMS
has been installed and manually synchronized, the distinctions between Primary
versus Secondary is no longer significant since either SMS an function as the
Active SMS,
The Management High Availability Environment
‘The Secondary SMS is created with empty databases, These databases are filled
‘with information that the newly created Secondary SMS receives from the Active
SMS. The Secondary SMS is ready once:
+ It is represented on the Primary SMS by a network object.
© SIC has been initialized between it and the Primary SMS.
© Manual synchronization has been completed with the Primary SMS for the
first time,
2
Check Point Security EngineeringManagement HA
Active vs. Standby
‘All management operations such as editing and installing the Security Policy and
‘modifying users and objects, are done by the Active SMS. If the Active SMS is
down, and any of these operations need to be performed, one of the Standby
'SMSs should be made active by the System Administrator. This transition from
Standby to Active must be initiated manually,
‘The Standby SMSs are synchronized to the Active SMS, and therefore, are kept
‘up-to-date with all changes in the databases and Security Policy. Security
Gateways can fetch the Security Policy and retrieve a CRL from both the Active
‘SMS and the Standby SMS.
What Data is Backed Up?
In order for Management High Availability to funetion properly, there must be a
backup of configuration and ICA data, such as:
Databases (such as the Objects and Users)
+ Certificate information such as Certificate Authority data and the CRL which
is available to be fetched by the Check Point Security Gateways
* The installed Security Policy. The installed Security Policy is the applied
Security Policy. The Security Gateways must be able to fetch the latest
Security Policy from either the Active or the Standby SMS.
Synchronization Modes
‘There are two ways to perform synchronization:
© Manual synchronization is a process initialized by the System Administrator
It can be set to synchronize databases, or databases as well as the installed
Security Policy
‘* Automatic synchronization is configured by the System Administrator to
allow the Standby SMSs to be synchronized with the Active SMSs at set
intervals. This is the standard mode of synchronization, since it keeps the
Standby SMSs updated. The synchronization schedule is based on when the
Security Policy is installed; both the installed Security Policy and all the
databases are synchronized, Additionally, it is possible to synchronize the
‘Standby SMSs when the System Administrator saves the Security Policy or at
a specified scheduled time.
It always possible to synchronize manually, even when automatic
synchronization has been selected configured.
Student Manual Bees
‘Clustering and Acceleration
Synchronization Status
‘The synchronization status indicates the status of the peer SMSs in relation to
that of the selected SMS. This status can be viewed in the Management High
Availability Servers window or in SmartView Monitor, depending on whether
you are connected to the Active or Standby SMS.
+ Never been synchronized — immediately after the Secondary Security
Management server has been installed, it has not yet undergone the first
‘manual synchronization that brings it up-to-date with the Primary Security
Management server.
‘= Synchronized — the peer is properly synchronized and has the seme
{database information and installed Security Policy
sd since the Active SMS
© Lagging — the peer SMS has not been synchr
had changes applied to it.
© Advanced — the peer SMS is more up-to-date
Collision — the Active SMS and its peer have different installed policies and/
‘or databases. The administrator must perform manual synchronization and
decide which of the SMSs to overwrite, For example, when SMS A fails
before a synchronization takes place, the changes made (to databases or to the
Security Policy) cannot be synchronized with SMS B. When SMS B takes
over from SMS A, the system administrator may decide to modify the
Security Policy.
74 Check Point Security EngineeringSecureXL: Security Acceleration
What SecureXL Does
Packet Acceleration
‘SecureXL: Security Acceleration
Patented SecureXL is a technology interface that accelerates multiple, intensive
security operations, including operations that are carried out by Check Point's
Stateful Inspection firewall, Using SecureXL, the firewall offloads operations to
‘a performance-optimized software or hardware device, drametically increasing
throughput
SecureXL. accelerates firewall and VPN performance by remembering certain
attributes of packets and packet flows that have already been validated by the
firewall/VPN application. Then, validation of related packets and connections is
delegated to the SecureXL API. This validation is done at the hardware interrupt
level on x86 hardware, or supervises execution of further optimized code in
attached network processors in IP security appliances that support them. Both of
these approaches involve substantially less computing overhead than is required
by the firewall/VPN application itself.
Packets attempting to establish a new TCP connection, or a comparable UDP
connection table entry in the firewall, are handled in the “slowpath”, Once the
frst packet is seen by the firewall and suitable connections/flows information is
off-loaded to an appliance OS, for example, further packets are handled at the
08's interrupt-level code.
‘The round-trip processing-interrupt driver to application and back to driver-level
code, is very time consuming, compared to the minimal processing necessary for
later packets that ean be done enticely at the driver level. Those later packets,
determined to be part of an existing, already validated flow, are forwarded
directly from the driver level without the added overhead of firewall application
involvement,
‘SecureXL. improved non-encrypted firewall traffic throughput, and encrypted
‘VPN traffic throughput, by nearly an order-of-magnitude particularly for small
packets flowing in long duration connections.
Packet acceleration is also referred to as throughput acceleration as it matches
‘on the familiar -tuple of source address, destination address, source port,
destination port, and protocol. However, only packets during the specific TCP/
‘UDP connection can be accelerated
‘Student Manat
18a
“Clustering and Acestoration
Session Rate Acceleration
SecureXL also reduces the overhead in establishing certain kinds of new
‘connections, improving new connection rate (connections per second) and
conection setup/teardown rate (sessions per second), as well as throughput in
certain high-connection-rate traffic environments.
‘The principle involved is a simple extension of SecureXL's approach to “one-
time validation” of a firewall flow. The one-time validation is extended from a
particular 5-tuple - source address, destination address, source por, destination
port, and protocol (one classic definition of a flow, or the definition of a
tmicroflow by Intemet researchers) - to a range, or block, of one or more of these
“tuples”.
Specifically, the source port ofa flow may be masked off, effectively providing a
‘tlobal match for source port, That is, once a flow is validated and established, a
template of that flow, with source port masked off, creating a global match, is
‘saved and remembered (with a configurable time-out). Any new connection
‘setup that matches four of the 5-tuples is again handled in the slowpath and not at
the driver level. All the new connection creation/old connection deletion is
handled in the slowpath. However, these new connection setup packets matching
4 out of 5 tuples avoid a round trip tothe firewall application, and limit the
computing overhead. Security is not impacted because the OS continues to track
the state of the new connection using stateful inspection,
Masking the Source Port
Man 2 parallel connections shown
iP as =e Gena
hase a
ISS tasoncrae ee semen | |? toowaine
coatrenn| ero Leese
Ss cancual wre commoner Leoaeratl | poq
a
nmi eon] re reouest_[eonsir ama
eas gse| WFP COMPONET [eens
ote | rrp COMPONET | eet
4
Figure 24 — Port Connectons
16 (Check Point Security Engineeringeee
‘SecureXL: Security Acceleration
To examine how ports are used in establishing TCP connections, consider the
following scenario:
A client requesting a connection to a server will initiate the TCP three-way
handshake. The client addresses the server, typically at a well-known port
umber depending on the service provided by the server (e.g. port 23 for Telnet,
port 80 for HTTP). Together, the server's IP address and the well-known port
‘number form a socket address. The client assigns and pairs an operating system
selected port nuinber with the client's IP address to create a socket address for the
reverse direction.
Application Layer Protocol - An example with HTTP
Consider higher-level application protocols that involve numerous TCP
connections between the client and server - either simultaneously (in parallel)
sequentially, or both, One of these protocols, which accounts for most Internet,
traffic, is HTTP.
‘Web pages consist of multiple HTTP components; text and perhaps dozens of
graphic elements. Using HTTP 1.0, each component is downloaded from server
to client using a separate TCP connection. This action involves substantial
overhead in connection setup and tear-down, and further overhead in protective-
firewall connection tracking (firewalls at both ends).
In all cases between a Web Client and a Web Server, TCP connection
establishment is initiated by the Web Client, which then sends an HTTP request.
‘The Web server responds by sending the HTTP component:
© HTTP Request (->) ~ Each of the packets from the Web client that requests an
HITTP component from the Web Server has the same source address,
destination address, destination port (80), and protocol (HTTP). Only the
source port, assigned by the Web client's operation system, one per
connection, differs in order to create unique socket addresses at the Client for
each HTTP request/component (via separate TCP connections for each
‘component).
© HTTP Component (<-) - Going the other direction, each of the packets from
the Web server that build the Web page components on the Web client has the
same source address, destination address, source port (80), and protocol
(ATTP). Only the destination port differs (t's been assigned by the client
operating system to that connection).
Student Manual 7a
‘clustering and Acceleration
HTTP 1.4
Let's look at applying SecureXL at the server Firewall. Once a connection
involving a flow to port 80 is approved by the firewall application for the Web
client (resulting from the first HTTP request) a template is created and stored. All
subsequent connection setups carrying those additional requests can share that
‘same template “approval” because its okay that the source ports differ.
Establishing those subsequent connections does not involve a round trip to the
firewall, resulting in faster processing through the server firewall,
Similarly, atthe client Firewall, once a connection involving a flow to port 80 is
approved by the firewall application (as above), all subsequent connections.
carrying these additional requests can share that same “approval.” Establishing.
those subsequent connections does not involve a round-trip to the firewall
SecureXL accelerates subsequent connection establishment through both
firewalls when multiple connections share the same source address, destination
address, destination (server) port and protocol.
HTTP version 1.0 operates as described above, and SecureX1 increases the
connection establishment rate of the firewall for tracking these connections. This
is because HTTP 1.0 creates a separate conection for each HTTP component,
‘The newer HTTP version 1.1 improves the protocol's performance by permitting
not only parallel, but also persistent and pipelined server connections, The server
‘may keep the connection alive after sending the end of a component, which
voids the need to create a new connection to send the next component. HTTP
1.1 is supported by most Web servers and the current generation of browsers,
as well.
High connection-rate network environments involve pritoarily HTTP traffic.
While HTTP 1.1 is significantly less connection-intensive, HTTP likely remains
the protocol that generates most of the new connection requests in enterprise and
Internet traffic. At the same time, while overall traffic levels continue to grow,
connection rates grow less quickly as network environments use primarily
ITP 1.1,
‘SecureXL connection templates create the opportunity to generate extremely
impressive connection rate performance, Given the benefit of connection
templates in heavy HTTP environments, the significant performance increase
can, in fact, be reflected in real-world traffic environments, particularly Web
‘server farms and in enterprises where there is a great deal of Web traffic to a
small, concentrated set of servers.
B
‘Check Point Security Engineering‘SecuraXL: Security Acc
tion
Other layer protocols such as UDP create many short lived connections in an
HTP page transfer, or extended streaming information can all be accelerated on
a session basis and can greatly reduce resource overhead on a busy firewall. FTP
‘and many types of VOIP have handlers which preclude acceleration,
Factors that Preclude Acceleration
‘There are several factors that preclude a packet fiom being accelerated:
© SDF (Sticky Decision Function)
= Q0s
‘© Connection destined to, or originated from the module
* Connections that requite Security Servers (AUTH, AV, URLF, AS)
* Connections that have a Handler:
ICMP, FTP, H323, ete
© Some IPS features
* IP ID, TTL, DNS Protocol enforcement
© Multicast packets
Factors that Preclude Templating (Session Acceleration)
‘There are factors that can preclude templating, if all other parameters are met for
packet acceleration
+ Time objects
+ Dynamic objects
* Domain objects
‘Source port ranges
+ IPS features which are not supported in Acceleration
° NAT
+ Encrypted Connections
Once templating is disabled in the rulebase, all connections matching rules lower
in the rulebase cannot be templated. Use fwaccel stat to determine at which
rule tempating is disabled and move the most used rules above that rule to take
advantage of session acceleration.
Student Manual 19‘Clustering and Acceleration
Packet Flow
“The figure shows the decision logic for packets flowing through an SecureXL
accelerated IP Security Appliances.
cones) (F] [=]
Figure 25 — Packet Flow Decision Logic
‘A new packet arrives atthe inbound interface, The packet is checked against
IPSO's connection table, which mirrors the Security Gateway’s connection table.
Fthere is a 5-tuple match (sre, dst, sport, dport, proto), then the new packet is
part of an existing flow and is forwarded to the outbound interface for handling
(forward, drop, of reject). This path involves the least amount of forwarding
overhead and accelerates throughput for packets that ae part of an existing flow.
Ifthe new packet does not match an entry in IPSO's connection table, then the
new packet represents a new flow and requires a new connection table entry.
However, ifthe packet matches an existing connection template, then the new
‘connection table entry can be created; (based on information in the connection-
teinplate table entry) without a round trip to the Firewall application. The packet
is then forwarded to the outbound interface for handling, This path reduces the
‘over-head involved in creating a new connection table entry and accelerates
rate for new connections that match existing connection templates.
80
Check Point Security EngineeringVPN Capabilities
‘SecureXt: Security Acceleration
If the new packet does not match an existing connection template, then a round
ip to the Firewall application is required to apply the Security Policy (rales).
‘This path involves the greatest overhead.
‘SecureXL also adds VPN routing capabilities and enhances connectivity to
support VPN in dynamic routing environment, configured in SmartDashboatd:
* VPN Link Selection — allows multiple external interfaces to be configured
for tunneling the VPN packets. It allows the firewall to create, maintain, and
update a table of Link Selection entries. The firewall ean specify which link
needs to be used for a given SA. If that link goes down, the firewall can
update the Link Selection entties to start using a different link for the same
tunnel.
* Dynamic VPN Routing — allows the VPN domain to be determined
dynamically instead of configuring a static VPN domain, With Dynamic VPN
routing enabled, connections can transition from clear text to encrypted or
fiom encrypted to clear text, based on the route taken by the connection, The
connection properties adapt to the route changes between an external interface
(untrusted) and an internal (trusted) interface by communicating in encrypted
or clear text respectively,
* Wire Mode Connections — allows trusted traffic to pass through without
‘Stateful Inspection. [fan internal interface is configured as wired (trusted) and
the VPN community is configured as wired, then the traffic passing through
the internal interface and getting encrypted using the VPN community, will
skip any Stateful Inspection. This increases the connectivity at lower security
for traffic between wired interfaces and a wired VPN community.
Student Maral
814
i
Clustering and Acceleration
CoreXL: Multicore Acceleration
As the first security technology to fully leverage general-purpose multi-core
processors, CoreXL introduces advanced core-level load balancing that increases
throughput forthe deep inspection required to achieve intrusion prevention and
high throughput on the firewall. With CoreXL, high performance and high
security can be achieved simultaneously.
‘Multi-core CPU support enables Check Point Security Gateways to share traffic,
‘among cores of a single system, providing superior price/performance on a single
server. The combination of multi-core CPUs and multi-threaded SecureXL
security application technology is the foundation for the next generation of
security acceleration-application-layer security. By joining a multi-core CPU
‘with SecureXL security acceleration, Check Point Security Gateways can deliver
‘more than 10 Gbps of intrusion prevention throughput
Using CoreXL, the firewall kemel is replicated multiple times. Each replicated
copy, oF instance, ofthe firewall kernel runs on one processing core. The
instances handle traffic concurrently, and each instance is a complete and
independent inspection kemel. Regarding network topology, management
configuration, end Security Policies, a CoreXL gateway functions as a regular
Security Gateway, All of the kemel instances of a gateway handle traffic going
through the same gateway interfaces and apply the same gateway Security
Policy.
‘Supported Platforms and Features
CoreXL does not support Check Point Suite with the following features;
‘© Check Point QoS (Quality of Service)
‘+ Traffic view in SmartView Monitor (all other views are available) (supported
on R75.30 and above)
+ Route-based VPN
‘+ IP Pool NAT (supported on R75.40 and above)
‘© IPv6 (supported on R75.40 and above)
© Firewall-1 GX
© Overlapping NAT
SMTP resource (supported on R75.40 and above)
© VPN Traditional Mode
© VRRP
82
Check Point Security Engineering‘CoreXL: Multicore Acceleration
Ifany of the above features/settings is enabled/configured in SmartDashboard,
then CoreXL acceleration will be automatically disabled on the Gateway (while
CoreXL is still enabled), In order to preserve consistent configuration, before
‘enabling one of the unsupported features, deactivate CoreXL via ‘epeonfig®
‘menu and reboot the Gateway (in cluster setup, CoreXL should be deactivated on
all members).
Default Configuration
Upon installation of CoreXL, the number of kemel instances is derived from the
{otal number of cores in the system as described in the following table
[UM df Cores” || “Number of Kernel insted |
1 CoreXL is disabled
2 42
a 2 —
es I6 ~
‘More than 8 Number of cores, minus 4
‘Table 3-1: Default Configuration
‘The default affinity setting for all imerfaces is Automatic when Performance
Pack is installed. Traffic from all interfaces is directed to the core running the
Secure Network Distributor (SND).
Processing Core Allocation
‘The CoreXL software architecture includes the Secure Network Distributor
(SND). The SND is responsible for:
Processing incoming traffic from the network interfaces,
© Sccurely accelerating authorized packets (if Performance Pack is running)
© Distributing non-accelerated packets among kernel instances.
‘Traffic entering network interface cards (NICS) is directed to processing core
running the SND. The association ofa particular interface with a processing core
is called the interface's affinity with that core, This affinity causes the interface's
traffic to be directed to that core and the SND to run on that core. Setting & kernel
Student Manual 83instance or a process to run on a particular core is called the instance's or
process's affinity with that core,
‘The default affinity setting for all interfaces is Automatic. Automatic affinity
‘means that if Performance Pack is running, the affinity for each interface is
automatically reset every 60 seconds, and balanced between available cores. If
Performance Pack is not running, the default affinities ofall interfaces are with
one available core. In both cases, any processing core running a kernel instance,
or defined as the affinity for another process, is considered unavailable and will
not be set as the affinity for any interface
In some instances, SND cores can be overloaded due to high traffic on multiple
interfaces assigned to the same SND core. Manual sim affinity can alleviate this,
symptom, Use sim affinity -1and the /proc/interrupts file to see
affinity distribution. Bach busy interface should be assigned its own IRQ and
distributed among SND cores. Refer to $k33250 on how to edit sim affinity.
In some cases, which are discussed in the following sections, it may be advisable
to change the distribution of kemel instances, the SND, and other processes,
among the processing cores. This is done by changing the affinities of different
NICs (interfaces) and/or processes. However, to ensure CoreXL's efficiency, all
interface traffic must be directed to cores not running kemel instances. Therefore,
if you change affinities of interfaces or other processes, you will need to
accordingly set the number of kernel instances and ensure that the instances run
(on other processing cores.
‘Under normal circumstances, itis not recommended for the SND and an instance
to share a core, However, it is necessary for the SND and an instance to share a
core when using a machine with exactly two cores.
Allocating Processing Cores
In certain cases, it may be advisable to change the distribution of kernel
instances, the SND, and other processes, among the processing cores.
‘Adding Processing Cores to the Hardware
Increasing the number of processing cores on the hardware platform does not
automatically inerease the number of kemel instances. Ifthe number of kemel
instances is not inereased, CoreXL does not uilize some of the processing cores.
‘After upgrading the hardware, increase the number of kernel instances using,
cepeonfig.
‘Check Point Security EngineeringCoreXL: Multicore Acceleration
Reinstalling the gateway will change the number of kernel instances ifyou have
upgraded the hardware to an increased number of processing cores, or if the
number of processing cores stays the same but the number of kernel instances
‘was manually changed from the default, Use epconfig to reconfigure the number
of kemel instances,
Ina clustered deployment, changing the number of kemel instances, such as by
reinstalling CoreXL, should be treated as a version upgrade. Follow the
instructions in the Upgrade Guide, in the “Upgrading ClusterXL Deployments”
cchapter, and perform either a Minimal Effort Upgrade using network downtime
or 2 Zero Downtime Upgrade (no downtime, but active connections may be lost),
substituting the instance number change for the version upgrade in the procedure.
‘A Fall Connectivity Upgrade cannot be performed when changing the number of
kemel instances in a clustered environment.
Allocating an Additional Core to the SND
In some cases, the default configuration of instances and the SND will not be
optimal. Ifthe SND is slowing the traffic, and your platform contains enough
cores that you can afford to reduce the number of kernel instances, you may want
to allocate an additional core to the SND. This is likely to occur especially if
‘much of the trafic is of the type accelerated by Performance Pack; in a
ClusterXL Load Sharing deployment; or if IPS features are disabled. In any of
these cases, the task load of the SND may be disproportionate to that ofthe kernel
instances,
ing a Core for Heavy Logging
If the gateway is performing heavy logging, it may be advisable to allocate a
processing core to the fwd daemon, which performs the logging. Like adding &
core for the SND, this too will reduce the number of cores available for kernel
instances,
Student Manual 85“Clustering and Acceleration
SecureXL Enabled
‘The following image depicts packet flow through the Security Gateway when
SecureXL is enabled:
Packet Flows
Figure 26 — Packet Flow through Securly Gateway
© Acceleration path — The packet is completely handled by the SecureXL_
device, It is processed and sent back again to the network. This path does all,
the IPS processing when CoreXL is disabled.
‘© Medium path — The packet is handled by the SecureXL device, except for
IPS processing, The CoreX1. layer passes the packet to one of the firewall
instances to perform IPS processing. This path is only available when
CoreXL is enabled.
‘© Firewall path — The SecureXL device is unable to process the packet. Itis
passed on to the CoreXL layer and then to one of the instances for full
firewall processing. This path also processes all packets when SecureXL is,
disabled.
86 Check Point Security EngineeringPractice and Review
Practice Lab
Lab 3: Migrating to a Clustering Solution
Review Questions
4. What is the main advantage of Monitored-cireuit VRRP?
2, What two modes does State Synchronization work in?
3, What does Checkpoint recommend for securing the synchronization
interfaces?
4, Ina Management HA environment, how do you know when the Secondary
‘SMS ready?
Student Manual 87Ie
‘Clustering and Acceleration
88 (Cheek Point Security EngineeringCHAPTER 4
Advanced User
Management
Student Manual
89)i
‘Advanced User Management
Advanced User Management
Consistent user information is critical for proper security. Without a centralized
data store, managing user information across multiple applications can be a
‘manual, error-prone process.
Chapter Objectives:
© Using an extemal user database such as LDAP, configure User Directory to
incorporate user information for authentication services on the network.
+ Manage intemal and extemal user access to resources for Remote Access or
across a VEN,
+ Troubleshoot user access issues found when implementing Identity
Awareness,
90 ‘Check Point Security EngineeringUser Management
User Management
Aside from knowing how to create internal users, organizing them into groups,
and creating user objects to set up in a policy, itis important to administrate users
authorized from a local or external database. This requires some knowledge
about those databases, and then how to integrate their use with Check Point.
ctory OU Structure
Active Directory is a database technology based on Lightweight Directory
Access Protocol (LDAP) created by MicrosoR, and is primarily used as
‘management too! for organizational structures in Windows environments, Active
Directory is based on objects and containers set up in a hierarchical
‘organizational structure. Bach tier of the hierarchy is comprised of containers
‘which contain objects, or a container that contain other containers and objects
Each object or entry in the directory is made up of a set of attributes. An
attribute has a name, such as an attribute type or attribute description, and one or
more values. The set of rules which governs the types of objects in the directory
and their associated attributes is called the schema. Each object has a unique
identifier, its Distinguished Name (DN). This is its Relative Distinguished
Name (RDN) constructed from some attribute(s) in the object, followed by the
parent entry's DN,
‘The container in this structure is called arr Organizational Unit or OU. OU's ate
tiers inthe hierarchy and contain objects, which can be defined in three
categories:
= resources — commonly defined as device objects such as printers, user PC's,
and servers.
= services — any service that may be used within the company netwark, ie.
‘e-mail, chat, file server access,
© users — user accounts apd their network access permissions
Student Manwat o1“hdvanced User Management
92.
Much like DNS domains, AD hierarchies are nested within each other, stemuning
from a root ot “enterprise” level. For example, the OU alphacorp.cp.local will
have sub-OU's such as produets alphacorp.cp local, sales.alphacorp.cp.local,
finance.alphacorp cp local, and mis.alphacorp.cp-local. Bach of these are
distinct containers at their own level, but they are all part of the enterprise
container, alphacorp.cp local. This extends down to the specific device object
level, so that a user in MIS could have an Active Directory designation of:
CN=Boucher Brie, OU=MIS,DC=alphacorp,DC=cp,DC=local, where MIS is
the OU or atribute of aiphacorp cp local.
‘The following is an example ofhow LDAP is commonly structured!
Figure 19 — LOAP Structure Example
Check Point Security Engineering
—See
User Management
Using LDAP Servers with Check Point
‘When Check Point software is implemented, you may already have an effective
User management infrastructure, such as LDAP. The Security Management
Server supports LDAP technology and can use existing LDAP servers to obtain
user information for authentication and authorization purposes.
Ifyou do not have a user management infrastructure in place, you can make a
choice between managing Domains on the intemal users database or choosing to
implement an LDAP server. If you have a large user count, itis recommended to
use an external user management database, such as LDAP. By maintaining the
large user database externally, the Security Management Server performance is
‘greatly enhanced, because then the database will not have to be reinstalled every
time the user information changes. Additionally, the LDAP user database can be
used by other applications,
In order to manage users on a User Directory (LDAP) server a special license is
required. You may choose to integrate the Security Management Server and
Security Gateways with User Directory in order to:
© Query user information
Enable User management
Enable CR retrieval
* Authenticate users
Student Manual 93nee rer
‘Advanced User Management
LDAP User Management with User Directory
‘When integrated with Check Point Security Management, LDAP is referred to as
User Directory (LDAP). When deployed with a User Direotory (LDAP) server,
the Security Management Server and the Security Gateways function as User
Directory (LDAP) clients, in the sense that the Security Management Server
‘manages the user information on the User Directory (LDAP) server, and the
Security Gateway will use it to query user information, retrieve CRLs and for
authentication.
‘When incorporating LDAP users with User Directory (LDAP), itis important to
understand how this is different from managing users internally. There are two
iain differences between user management on the intemal database, and user
‘management on a User Directory (LDAP) server. First, user management in the
User Directory (LDAP) server is done externally and not locally. Second, on a
User Directory (LDAP) server templates can be modified and applied to users
dynamically. This means that user definitions are easy to change and to manage;
and changes are instantaneous of “live”. Changes that are applied to a User
Directory (LDAP) template are reflected immediately forall users who are using
that template.
User Directory (LDAP) features the following:
© It is based on a client/server model, in which an LDAP client makes a TCP
connection to an LDAP server.
© Bach entry has a unique Distinguished Name (DN).
© Default port numbers are TCP 389 for standard connections, and TCP 636 for
‘Secure Sockets Layer (SSL) connections (LDAPS or LDAP over SSL).
‘© High Availability, by replicating the same information on several servers,
© Compartmentalization, by allowing a large number of users to be distributed
‘across several servers
‘Encrypted and non-enerypted connections, where connections between the
clients (ie., SMS, SG) and the User Directory (LDAP) servers are conducted
using SSL or in the “clear”,
‘© Support multiple LDAP vendors using Profiles
4 Check Point Security EngineeringUser Management
Defining an Account Unit
Simply put, the Account Unit is the interface between the clients and server. Each
‘Account Unit represents one or more branches of each User Directory (LDAP)
server. Once an Account Unit is defined, it represents the location of users in the
LDAP tee structure according to organization hierarchy in a corporation. For
‘example, users in R&D may be split between developers in different product
lines, but are still defined in one Account Unit, whereas another Account Unit
may be defined for users in Finance even though both Account Units are
associated with only one User Directory (LDAP) server.
Configuring Active Directory
‘Schemas
Student Marwal
‘When configuring Active Directory in SmartDashboard, a User Management
‘wizard (Identity Awareness setup) guides you through the steps. A search is made
to detect any Active Directory servers on the network. If no AD server was
tected, the Administrator will have the option of creating a new domain. The
User Management wizard contains two parts:
© Quick setup of AD
+ Users, Groups, LDAP Groups and Authentication Servers Management
An LDAP schema defines the types of objects and object attributes in the
directory, A default schema exists which includes user definitions for that
proprietary LDAP server. When all users use the same authentication scheme and
are defined according to a default template, the default schema is satisfactory. But
for eases where users must be defined differently, a Check Point schema can be
employed. The Check Point schema complements the structure of the
information in the LDAP Server, but includes Security Management Server and
Security Gateway specific information as well. Itcan be used to enhance object,
definitions in the directory for more granular user authentication.
95Multiple User Directory (LDAP) Servers
‘Where multiple User Directory (LDAP) Servers exist in an organization, a query
from one of the clients for user information is made to the servers based on a
priority. This priority is defined either
+ By Gateway — Can be configured based on proximity to the LDAP server in
the organization.
‘= By Account Unit — Has a default User Directory (LDAP) server priority list
in the event a Gateway does not have a set LDAP server pri
Authentication Process Flow
Essentially, the authentication process begins with a fetch or query to the user
database, Once the user is located, the authentication method is determined, the
user is authenticated, then authorized for access.
Figure 20 — Authentication Process Flow
During a query by a gateway, it will first check the intemal users database. If the
particular user is not defined here, the gateway will query the User Directory
(LDAP) servers defined in the Account Units one ata time based on their
priority. Ifthe user is not found on one User Directory (LDAP) server, then the
next one in line is queried,
96 ‘Check Point Security Engineeringa
User Management
If more than one Account Unit is defined on a particular User Directory (LDAP)
server, then they are each queried concurrently. Results from one or more than
fone Account Unit may meet the conditions of the query. In this case, it will
epend on gateway configuration as to which result will be applied
If no match is found from searching the User Directory (LDAP) servers, the
gateway uses the extemal users template to find a match based on the generic
profile.
Limitations of Authentication Flow
‘Though this process is very effective, there are some limitations to keep in mind,
Namely:
‘The authentication method is set on the user record on the internal database
In the case where an LDAP database is used, the authentication scheme
cannot be set on the user record without extending the LDAP schema,
© There is a predefined search order, First the internal database is searched
followed by the LDAP Servers. This slows the search down, and often results
in conflicting user information,
+ All the Account Units ate searched simultaneously. Consequently, it cannot
be determined which Account Unit to search. The different users may have
the same username on different servers. However, in R75, this limitation is
addressed in the gateway configuration settings,
User Directory (LDAP) Profiles
Student Manat
For multi-vendor LDAP Servers, User Directory profiles are assigned to ensure
that the default attributes fora given LDAP Server are properly applied. Different
LDAP vendors have dissimilar object repositories, schema and object relations,
and User Ditectory profiles are designed to normalize them for management
purposes.
Four default profiles exist, and each one can be modified based on Common,
Read and Write settings:
> OPSEC_DS — the default profile for a standard OPSEC certified User
Directory (LDAP) server
© Netscape_DS — the profile for a Netscape Directory Server
© Novell_DS — the profile for a Novell Directory Server
© Mierosoft_AD — the profile for Microsoft Active Directory.
‘The profile is configured whenever creating or editing an Account Unit.
7a —————
‘Advanced User Management
Troubleshooting User Authentication and User Directory (LDAP)
When encountering authentication problems for a user defined on the User
Directory (LDAP) Server, first verily configuration settings:
4. Make sure that Global properties > Smart Directory (LDAP) > Use User
Directory(LDAP) for Security Gateways is checked,
2, Verify that your AU (Account Unit) is configured for user management, ic,
User management is checked on the General tab of the AU.
3, Configure the correct User Directory profile. Which LDAP server are you
using? Is it one of our supported OPSEC servers?
Verify that your OPSEC LDAP server is supported on http: //
wnt opsec.com/solutions/sec_authentication.html.
4. Check the AU object is configured correctly, ie. profile, correct branches
and administrator DN.
5. Check the LDAP group objects configuration. How did you configure the
LDAP groups? If you selected the option:
[All Account-Unit’s Users or Only Sub Tree - the groups defined on the
LDAP server are irrelevant
‘Only Group in branch - the group must point to a group on the LDAP.
server, Is ita dynamic group?
6, Where do you use authentication? The relevant LDAP groups should be used
in the authorizations of the product that uses authentication. For example,
when using Endpoint Connect, the user groups should be defined on the
RemoteAccess object.
Once all the above are configured correctly and you have all the answers you
need, obtain the following debugging information:
* Run TDERROR_ALL_AU=5 on the process that performs the authentication
In this ease, it depends on item number 4 above; for example, it would be the
‘vpnd process for Endpoint Connect. Try to authenticate with the
problematic user (and with a user that authenticated successfully if you have
‘one), and save the log file.
© A capture of a successful and unsuccessful login will help you in
investigating the problem, but be sure your AU object is configured not to
‘work with SSL so that you have a clear connection. When you have the
capture, try to see which attributes are being used to query for group
membership.
98.
Check Point Security EngineeringSn
‘Troubleshooting User Authentication and User Directory (LDAP)
Common Configuration Pitfalls
‘When troubleshooting User Directory (LDAP) issues, the following tips are
useful to keep in mind as potential causes:
* The Use User Directory (LDAP) checkbox is unchecked in Global Properties
* Getting the bind credentials for the LDAP AU is wrong, Incorrect credentials,
are not flagged at the time the AU is created.
‘+ The option, User Management is unchecked on the General fab of the AU.
* Allowed authentication schemes may be configured on the SG, but the
‘corresponding scheme is not selected in the AU properties.
* The AUs are assigned to the SG, but the AU is not selected,
+ The LDAP schema is not extended and the AU is not assigned with an
authentication scheme. Even if the schema is extended, the authentication
schema on the user record could stil be undefined. It will remain undefined
even though the AU defines a scheme.
* Ifthe generic template is used and a password is defined on it,
‘Some LDAP Tools
For tools on the firewall, refer to:
+ ldapsearch
For example: 1dapsearch -D en-administra-
tor,cn=users,de-boaz,de=com -w zuburl! -b
cnsusers,de=boaz,de=com -h 20.20.20.100 '(&(object-
class=user) (sAMACcountName=zaza) )' mobile otherHo-
bile
* Ldapema (per process, commands: cacheclear, cachetrace, log
on/off)
* ldapmodizy
For example: ldapmodify -c -h -D -w
-f£
Student Manual 99‘Advanced User Management
Troubleshooting User Authentication
‘A set of libraries in the /CPShaxed directory is linked to the application
process, The processes which perform the authentication include:
© fwm - SmartDashboard authentication
‘ ypnd - Remote Access authentication
“© evpnd - SSL VPN user authentication
‘© Security Servers - user/client/session authentications
In addition, while the actual authorization is performed by the application, the
authentication is mostly performed by the infrastructure in epauth. The
authentication infrastructure code modules in the chain include:
© epauth,
‘The authentication schemes performed by cpauth include:
Username and password (internal database as well as LDAP)
RADIUS
SecurID
TACACS
8 password
‘© cpldapel, ldap
© aceSsdk
In addition, when examining log entries, search forthe following information to
help with the debugging:
© Username
+ Functions: make_au, au_auth, au_fetchuser, cpLdapGetUser,
ephdapCheck
‘© After fetch the user’s set is printed
+ Auth starts with au_auth_auth, look for the authentication result
© Often the problem is authorization, not authentication
Check Point Security EngineeringIdentity Awareness
Student Manual
‘This section devotes attention to troubleshooting Identity Awareness to address a
typical network security expert's job task requirements. Advanced User
“Management must take into account this product because of its importance in
controlling corporate resources and increased visibility of user activities.
entity Awareness includes these key features:
© Configurable access roles — Use the Identity Awareness software blade to
easily add users, user-groups and machine identity intelligence to your
security defenses, This information is obtained from the corporate directory
services.
© Multiple user identification methods — Provides multiple methods to
obtain a users identity; Clientless, Captive Portal or Light Agent. Identity
information can be utilized by relevant software blades to apply and enforce
user-based policies
© Deployment wizard for fast & simple deployment — Adding identity
intelligence via the Identity Awareness Software Blade is fast and easy with
the built in deployment wizard. In a few steps user, user-group, and machine
information can be made available to utilize in policies throughout the
security infrastructure.
+ Identity sharing — Identity information can easily be shared as required, on
‘a single gateway or across the entire network. In a multiple gateway
deployment, such as multiple branches or multiple gateways protecting
internal resources, identity can be acquired on one gateway and shared among
all gateways.
Identity Awareness uses IP addresses, normally reserved by the Firewall to
‘monitor traffic as @ means to map users and machine identities.
Identity Awareness acquires user identities in several methods referred to as
Identity Sources, which include AD Query, Captive Portal, and Light Agent. For
troubleshooting purposes, we will focus on two types:
© AD Query identifies users logged on to Active Directory without prompting
users for installation or credentials
+ Captive Portal (browser based authentication) identifies users by sending
them to a Web pege for authentication with Active Directory or other LDAP
servers.
101—_— ees
‘Advanced User Management
‘Once you enable an identity source on the gateway, the gateway will map IP
addresses in your network to the respective user active for each IP. When traffic
arrives frotn/to the IPs, the gateway will include the user and computer name in
the logs,
‘The following information provides some tips for troubleshooting cases when
Identity Awareness cannot identify users in your network, and when traffic logs
do not contain user information,
‘The troubleshooting procedure includes:
4. Verifying AD Query Setup
2. Identifying users behind an HTTP proxy
3. Verifying there's a logged on AD user in the source IP
4, Checking the source computer OS and activating captive portal
5, Using SmartView Tracker for further troubleshooting
Enabling AD Query
Once you enable AD Query on a gateway, the gateway will register to the
‘configured domain controllers in order to receive security event logs. By
analyzing these logs, the gateway will map IPs on your network to their
respective users and computers.
AD Query does not detect all users and computers immediately. Depending on
the activity in your network, AD Query may take up to a few hours to complete
the mapping of users and computers to IPs.
To quickly identify a user, lock the user computer, wait a few seconds and then
unlock it, This will generate a security event log and mapping of the user name to
the IP will take place.
102 (Check Point Security EngineeringAD Query Setup
Student Manual
In addition to enabling AD Query in your policy, verify thatthe following
conditions are met:
© Active Directory event logging is setup
‘Verify that domain controllers are configured to audit authentication success
events. This is the default behavior in AD but may have been changed in your
‘organization. In the domain controller Event Viewer, look forthe following
event numbers:
© Windows 2003: events 672, 673 and 674,
* Windows 2008: events 4624, 4768, 4769 and 4770,
» The LDAP Account Unit is setup.
Verify that all domain controllers to which users authenticate are configured
in the LDAP Account Unit Servers list. The Security Event log is not syn-
chronized between domain controllers
‘© The gateway successfully connects to all domain controllers
Use SmartView Monitor to see the status of connections to domain control-
Jers or run “adlog a de” in expert mode on the gateway to see connection sta
‘us from the gateway to domain controllers. Typical reasons for Jack of
connectivity to domain controller:
+ A firewall/IPS device en route to the domain controller is
blocking DCOM (port 135 or high port used by DCOM).
© Check Point Firewall or IPS may be blocking DCOM. See SK.
58881 for resolution,
‘© Non-English user names: To support non-English user names, you must set an
attribute using dbedit or GuiDBEdit. Set the Suppor tUnicode attribute to
true on the LDAP Account Unit object. The LDAP Account Unit object is
found in the Servers table,
© That users reach the gateway and domain controller with the same
endpoint IP,
Users will reach the gateway with a different IP in the following cases:
‘© When there's a NAT device between the users and the AD domain controller
or gateway.
‘© When users connect through a Citrix or Terminal Server.
‘© When many users authenticate to one server such as Outlook Web access
server.
103‘Advanced User Management
Users connecting behind NAT or via Citrix or Terminal Servers are supported via
‘an agent. When AD Query detects 7 or more users on the same IP, this IP is
disregarded.
Identifying users behind an HTTP proxy
If your organization uses an HTTP proxy server positioned between users and the
Security Gateway, logs will show the proxy as their source IP address end will
not show the users identity, For Application Control, the gateway can use the X-
Forward-For HTTP header, which is added by the proxy server, to resolve this
issue.
To use X-Forwarded-For HTTP header with Application Control:
4, Configure your proxy server to use X-Forwatded-For HTTP Header.
2, In SmartDashboard, on the Identity Awareness page of the gateway object,
check “For Application Control blade, detect users located behind HTTP
proxy using X-Forwarded-For header".
3. Install the policy.
Verifying there's a logged on AD user at the source IP
‘Once you verified the conditions in “AD Query Setup” are met, the next step is to
‘verify that the computer on the IP in question is a domain computer and there's @
user logged on.
‘To verify that the source IP is indeed of an AD user:
4. Verify the computer is a domain member. From a computer in the domain, try
to access the C§ share on the source IP. For example, using the Start ~
‘Run command, enter \\10.0.0.2\¢S. When prompted for credentials,
enter a domain administrator credentials. If you successfully opened the C&
share it means this is a domain computer
2. Verify that there's a user logged on. Use a WMI tool such as WMI Explorer to
remotely connect to the IP and query for the user name.
Check Point Security EngineeringTentity Awareness
Checking the source computer OS
Ifyou cannot connect to the source IP C$ share or with WMI Explorer, i is likely
that this IP is a computer that is not a member of the domain. Its also possible
but less likely, that this IP is a domain computer but RPC and WMI traffic is,
blocked in your network or on the target computer.
‘To help determine the OS at the IP, use remote endpoint profiling tools such as
nmap to detect the OS. For example run “nmap ~A 10.0.0." todetect the
8 on this IP:
Figure 21 — nmap Example
If this is not a Windows computer, tur on the captive portal on the gateway so
that Web traffic will be intercepted and the user will have to authenticate. (The
AD Query identifies computers logged on the domain.)
Student Manwatne
“Ravanced User
agement
Using Smartview Tracker
106
When you've verified that the source IP belongs to an AD user and the
conditions described in “AD Query Setup” are met, but traffic logs still don’t
contain this user, you can track the Identity Awareness Login Activity in order to
further troubleshoot the cause.
4, Open SmartView Tracker ldentity Awareness Login Activity view.
2, Search for log records from the user that's missing in logs.
‘Login logs (green door) and Logout logs (grey door) will be displayed.
3. Follow the stops below to find the possible cause of the missing users:
— If you see no Login logs, try searching in log files that have been switched.
already (Smart View Tracker will open the active log files). If you stil see no
1ogs, it means that AD Query failed to identify the user and you should con-
tact support.
— Ifyou see Login logs and AD Query runs on a different gateway (not the
‘one that generated the traffic log), verify that identity sharing is configured
correctly in the Identity Awareness properties.
— In the Identity Sharing properties of the gateway that generates the logs,
‘verify that it gets identities from All sharing gateways or specifically from
the gateway that runs AD Query. Inthe Identity Sharing properties of the
gateway that runs AD Query, verify that Share local identities with other
gateways is checked.
If you see Logout logs despite the fact that the user was active in the duration
following the Login log, try to increase the AD Query association time-out
‘This time-out is 12 hours by default but if i's lowered, users will be detected
as logged out sooner. (When using AD Query, Logout occurs when no secu-
rity event logs are created for a user for 10 hours by default)
— If you see a Logout log of the user followed by a Login log ofa different
user on the same IP, then it's possible that there is a Windows service thet logs
‘on with a user account.
By default, AD Query will aggregate the 2 or more users on the IP unless you
‘checked the Assume that only one user is connected per computer option,
in which case the service will cause the user account to be logged out.
‘To deal with this scenario, enter the account used by the service in the
Excluded Users/Machines list found in AD Query Advanced Settings.
Check Point Security EngineeringPractice and Review
Practice and Review
Practice Lab
Lab 4: Configuring SmartDashboard to Interface with Active Directory
Review Questions
41. What objects make up an Organizational Unit container?
2. What does an LDAP Schema do?
3. What long does it take foran AD Query to map users and computers to IPs?
4, If you cannot connect to the source IP C$ share or with WMI Explorer, what
is the likely cause?
Student Marsal 107“Advanced User Management
108 ‘Check Point Security EngineeringCHAPTER 5
Advanced IPsec VPN
and Remote Access
Student Manual
109“Ravanced IPeee VPN and Remote Access:
Advanced IPsec VPN and Remote Access
Check Points VPN Software Blade is an integrated software solution that
provides secure connectivity to comporate networks, remote and mobile users,
branch offices and business partners. The blade integrates access contro,
‘authentication and encryption to guarantee the security of network connections
over the public Internet.
Objectives
+ Using your knowledge of fundamental VPN tunnel concepts, troubleshoot a
site-to-Site or cetificate-based VPN on a corporate gateway using IKEView,
‘VPN log files and command-line debug tools
'* Optimize VPN performance and availability by using Link Selection and
Multiple Entry Point sotutions.
‘+ Manage and test corporate VPN tunnels to allow for greater monitoring and
scalability with multiple tunnels defined ina community including other VEN
providers.
110 Check Point Security Engineering‘Advanced VPN Concepts and Practices
Advanced VPN Concepis and Practices
IPsec
As a nctwork security expert, working with VPNs is fundamental to your typical
tasks and job responsibilities, requiring an in-depth working knowledge of VPN
technology and concepts. This chapter assumes a basic comprehension of
‘encryption, cryptography applications (algorithms and hash methods), and
configuration of site-to-site VPNs using either pre-shated secrets or Certificates.
IPsec is an open standard protacal suite for secure IP communications using
authentication and eneryption techniques on IP packets. The following are used
to perform various functions:
© Encapsulating Security Payloads (ESP) — provides confidentiality, data
‘origin authentication, connection less integrity, an anti-replay service, and
limited traffic flow confidentiality
© Security Associations (SA) — though not s protocol, this data structure
provides the bundle of algorithms and data that ae the parameters necessary
{o operate the AH and/or ESP operations.
Internet Key Exchange (IKE)
Itis the Security Associations that provides the set of algorithms and data that
‘establish the parameters to use AH and ESP. The SA provides the necessary
framework for authentication and key exchange, so thatthe actual Internet Key
Exchange (IKE) protocol can provide the authenticated keying material, The
‘encrypled traffic flows unidirectionally,s0 a pair of SAs is required to form a
tunnel tht is bidirectional.
IKE negotiation consists of two phases, Phase 1 (Main mode), and Phase 2
(Quick mode). The negotiation process in both modes can be observed in
ike .elg with an intemal Check Point utility called IKEview. We will cover
guidelines for analyzing ike .e1g, and instructions for collecting ike.elg
and vpnd. elg data.
This section discusses only IKEv1 and not Aggressive Made. While Aggressive
‘Mode is preferred by some third party gateways, its use is discouraged for Check
Point configurations unless required in your production environment
Student Manual
it‘Advanced IPsce VPN and Remote Access
IKE Key Exchange Process - Phase 1
Troubleshooting a VPN requires an understanding of the process of creating @
‘VPN tunnel, The following is the IKE exchange process.
Phase 1 (Main mode) negotiates encryption methods, (ie. ABS, 3DES, ete), the
hash algorithm (SHA1 and MDS), and establishes 2 key to protect messages of an
exchange. The following describes the stages of the Phase | process:
Stage 1: Peers negotiate algorithms, authentication methods, and Diffie-
Hellman (DH) groups.
Stage 2: Each gateway generates a DH private key and public keys and cal-
culate the shared keys.
Stage 3: Peets authenticate using the certificate or PSK.
Example: The IKE exchange uses six packets for Phase 1 (Main mode) and three
packets for Phase 2 (Quick mode): For Main mode packet 1, the initiator
172.24.104.1 provides the following information:
‘+ Encryption algorithm: AES-CBC
+ Key length: 256 bit
© Hash algorithm: SHAL
* Authentication method: pre-shared key
=
i
LE
Figure 22 —IKEView
112
Cheek Point Security Engineering‘Advanced VPN Concepts and Practices
4. Packet 2 is from the responder to agree on one eneryption and hash algorithm:
| al
a wld
simatic ati cml
Figure 28 — Packet 2,
2, Packets 3 and 4 perform key exchanges and include a large number never
used before, called a nonce. A nonce is a set of random numbers sent to the
other party, signed and returned to prove the party’s identity. These two pack-
ets are not generally used in troubleshooting a key exchange with IKEview.
Figure 24 — Packels and 4
Student Manuat
113ee
“Advanced IPsee VPN and Remote Access
3. Packets 5 and 6 perform authentication between the peers of the tunnel. The
peer’s IP address shows in the ID field under MM packet 5:
Figure 25 — Packets § and 6
4, Packet 6 shows the peer has agreed to the proposal and has authenticated the
initiator:
Figure 26 —Packot 6
Jn Phase 2, the IPsec Security Associations (SA) ate negotiated, the shared-secret
key material used for security algorithms is determined, and an additional DH
‘exchange occurs, Phase 2 flutes ate frequently due to a misconfigared VPN
Domain, which could include omitted objects, duplicated objects or choosing all IP
addresses behind the Security Gateway. Typically, Check Point recommends 2
4 Check Point Security Engineeringae eee eee eee eee ee ee ne mee ete ee EE
Phase 2 Stages
‘Advanced VEN Concepts and Pra
‘manually defined VPN Domain, which includes all network objeets that will
participate in the VPN communication
Phase 2 can be broken into the following general stages:
* Peers exchange more key material, and agree on encryption and integrity
methods for IPSec.
* The DH key is combined with the key material to produce the symmetrical
IPSec key.
© Symmetric IPSec keys are generated
‘The following steps detail the Phase 2 stages:
41, Packet I proposes either a subnet or host ID, an encryption and hash
algorithm, and ID data:
Figure 27 — Packet 1
Student Marat
usi
“Advanced IPsec VPN and Remote Accoss
In the ID field, the initiator's VPN Domain configuration displays. In the fol-
lowing figure, the VPN Domain for the initiator is the 10.2.4.0/24 network
Figure 28 — VEN Domain
2, ID field_2 proposes the peer’s VPN Domain configuration. In the figure
below, the VPN Domain for the peer Gateway is the 10.2.2.0/24 network:
Figure 29 — VPN Dorin
16 (Check Point Security Engineering3, Packet 2 from the responder agrees to its own subnet or host ID, and encryp-
tion and hash algorithm:
‘glo)ahelsia
fi
4. Packet 3 completes the IKE negotiation:
igure 30 — Packet 2
Poke wuttont agen ore ners o»
"yim ato sey safe mee
‘Stgegenag iste aesszss eso ae
bys aeacea al
Siemans
Figure 31— Packet 3
‘Student Manwal 7“Advanced IPsee VPN and Remote Accoss
Remote Access VPNs
Connection Ini
‘Aside from the site-to-site and certificate-based VPNs, Check Point provides
several Remote-Access VPN solutions that enable VPN tunnel creation between
‘emote users and an organization's internal network. The most recent of these is
Endpoint Connect, which is a lightweight remote access client supplying secure
IPsec VPN connectivity to resources on the client machine. It is designed so that
the native desktop is used to launch business applications rather than through
mobile access portal. Unlike SecuRemote/SecureClient remote access solutions,
Endpoint Connect does not require authentication each time a connection is
initiated,
In order for a VPN tunnel to be established between the site (Security Gateway)
and a remote user, an IKE negotiation must take place between them. The peer
identities are authenticated (phase 1), where the gateway and client each verify
the other's identity, Authentication is performed using
igital Certificates
© Pre-Shared Secrets,
© Hybrid Mode
= One-Time Password
= Security Gateway Password
- 08 Password
- RADIUS
=TACACS
SAA
‘Once authentication is successful, the final IKE negotiation is attempted
(phase 2), and the VPN tunnel is established.
However, in order for encrypted connections to exist for SecuRemote/
SecureClient remote users, the organization’s internal network (topology) must
bbe known. The Security Gateway downloads this information which includes
IP addresses of network resources and host addresses of other Security Gateways
that are part of the VPN domain. This topology information, along with client
configuration properties, is downloaded to the client over a secured connection
using SSL over IKE,
118
Check Point Security EngineeringSans
‘Remote Acceas VPN
‘The connection type in which a client connects with the gateway is ealled the
Connect Mode. The initial connection is made directly to the gateway, but all
subsequent connections to internal resources will be made through transparently
initiated VPN links. Recall that there are five connection methods which can be
used separately, or together:
+ Office Mode — Where a Gateway assigns a remote client an IP address after
connection and authentication takes place.
* Visitor Mode — When the client needs to have a tunnel to the gateway site
through a TCP connection on port 443
‘+ Hub Mode ~ Where all traffic is routed through the Security Gateway
* Auto connect — When an application tries to open a connection to a host
behind a gateway, SecureClient will prompt the user to open a tunnel to that
gateway.
* User Profiles — Different user profiles are used to overcome changing
connectivity conditions, for example, a profile that enables Visitor mode
‘when the remote client must tunnel the VPN connection over port 443.
Link Selection
‘There are times when having more control over VPN traific is useful, particulaily
when high-traffic demands are applied to the gateway and its performance is
impaired. Link Selection provides the means to specify which interfaces are to be
used for incoming and outgoing VPN traffic. The Administrator can also choose
the IP addresses used for VPN traffic on each Security Gateway.
‘Among the configuration options, the administrator can choose to:
Probe links for availability
* Use Load Sharing on links to distribute VPN traffic
* Use links based on services to control the bandwidth
* Set up links for remote access
Link Selection is configured in Security Gateway Properties > IPSec VPN >
Link Selection. For more details about these settings, refer to the R7S VPN
Administration Guide.
Link Selection is only applicable to locally managed VPN peers, such as
Endpoint Connect users, or other gateways configured for VPN traffic as long as
they are managed centrally by the same Management Server or CMA (see Multi-
Domain Security Management)
Student Manual 119a
‘Ravanced IPsec VPN and Remote Access
120
Ifthe link is set to the wrong IP address, VPN connectivity configured for a
remote site can be damaged, unless itis configured to “aulo-probe”. For example,
assume a client creates a site with the external IP address of the gateway. During
the creation process, the topology is downloaded, including the link selection IP,
‘which was set to the intemal interface of the gateway. From that point, the client
‘will attempt to establish a tunnel with the IP address set in the Link Selection
settings (the internal IP address), instead of the pre-configured external IP
selected during site creation. In this case, the connection to the site will most
likely fail,
Check Point Security Engineeringes
‘Muitiple Entry Point VPNs
Multiple Eniry Point VPNs
Ifa single gateway provides access to internal resources for remote VPN
connections, then access to valuable resources to remote users is vulnerable
should the gateway become unavailable. A Multiple Entry Point (MEP) solution
was devised to provide an HA solution for VPNs. However, unlike Clustered
gateways:
* MEP VPNs are not restricted to the location of gateways.
* MEP Security Gateways can be managed by separate Management Servers
'* There is no state synchronization needed between gateways, If one MEP
gateway fails, the current connection is fost, but another MEP gateway picks
up the next connection.
‘+ The VPN client selects which Gateway site will take over the connection
should the first fail, clustered Gateways make the selection themselves in a
ClusterXL deployment,
How Does MEP Work
MBP VPNs use the proprietary Probing Protocol (PP) to send special UDP RDP
packets to port 259 to discover whether a location (IP) is reachable. It is used by
the peer to continuously probe all MEP Security Gateways. The probe will
indicate if gateway is available or not. In this way, each MEP gateway shares its
status with the others, and updates each should conditions change.
Explicit MEP
Only Star VPN Communities using more than one central Security Gateway can
be defined explicitly as MEP VPNs. This is the recommended method, Explicit
‘MEP VPNs ean be configured to have the entry-point Security Gateway chosen
either by:
* Selecting the closest gateway to the source (First to respond)
* Selecting the closest gateway to the destination (By VPN domain)
* Selecting randomly (for Load distribution)
* Selecting from a priority list (MEP rules)
Student Monat 121—_—_—__—SFSFSeSFSFSFSFFFe
“Ravanced IPsee VPN and Remote Access
Implicit MEP
If fully or partially overlapping encryption domains exist, or where primary or
backup gateways are configured, then the MEP VPNs can be implicitly defined
Implicit MEP VPNs can be configured to have the entry-point Security Gateway
selected either by:
First to respond — When no primary Security Gateway is available, all
gateways have equal priority, and the first gateway to respond to the probing
RDP packets gets chosen as the entry point, Usually, that means the gateway
closest to the remote VPN peer in proximity.
* Primary-Backup — If the primary Security Gateway fails, VPN
connectivity is made to go through the backup gateway.
‘© Load Distribution — [fall the Security Gateways share equal priority and
the same VPN domain, the traffic load can be distributed so that the
‘connections are shared evenly between all the gateways.
For remote access MEP VPNs, each client must use Office mode and assigned its
‘own pool of addresses. Ifthe clients are connected via a routing backbone, then
each poo! must be routed to the appropriate site Ifthe client is connected via site
to-site, then it needs to be included in the encryption domain of each gateway.
122
Check Point Security Engineeringeee
‘Tunnel Management
Tunnel Management
‘There are two types of VPN tunnel management:
‘* Permanent Tunnels — This feature keeps VPN tunnels active, allowing real-
time monitoring capabilities.
+ VPN Tunnel Sharing — This feature provides greater interoperability and.
scalability between Gateways, Italso controls the number of VPN tunnels
created between peer Gateways,
Permanent Tunnels
‘AS companies have become more dependent on VPNs for communication to
other sites, uninterrupted connectivity has become more crucial than ever before.
It is essential to make sure VPN tunnels are kept up and running. Permanent
Tunnels are constantly kept active, and as a result, maKe it easier to recognize
malfunctions and connectivity problems. Security Administrators can monitor
the two sides of a VPN tunnel, and identify problems without delay, Each VPN
‘unnel in a Community may be set to be a Permanent Tunnel.
Since Permanent Tunnels are constantly monitored, ifa VPN tunnel fails for
some reason, a log, alert, or user-defined action can be issued. A VPN tunnel is
‘monitored by periodically sending tunnel-test packets. As long as responses to
the packets are received, the VPN tunnel is considered “up”. If no response is
received within a given time period, the VPN tunnel is considered “down”,
Permanent Tunnels can only be established between Check Point Gateways. The
configuration of Permanent Tunnels takes place on Community objects. There
are three options to configure @ Permanent Tunnel:
* For the entire Community — this option sets every VPN tunnel in the
Community as permanent,
+ For a specific Gateway — use this option to configure specific Gateways to
hhave Permanent Tunnels,
* Fora single VPN tunnel — this feature allows configuring specific tunnels
between specific Gateways as permanent.
‘Shudert Memual 123“advanced IPsec VPN and Remote Access,
Tunnel Testing
‘Tunnel Testis a proprietary Check Point protocol that is used to test whether
VPN tunnels are working, A tunnel-test packet has an arbitrary length, with only
the first byte containing meaningful data — the type field,
‘The type field can take any of the following values:
1 Test
2-Reply
3-Conneet
4 - Connected
‘Tunnel testing requires two Gateways, one configured as a “Pinger” and one as a
“responder”. The Pinger Gateway uses the VPN daemon (vpnd) to send
cnerypted tunnel-testing packets to the responder Gateway. The responder
Gateway is configured to listen on port 18234 for special tunnel-testing packets,
‘The Pinger sends type I of 3. The responder sends a packet of identical length,
with type 2 or 4 respectively, During the connect phase, tunnel testing is used in
two ways:
‘© A connect message is sent to the Gateway. Receipt of a connect message is
the indication that the connection succeeded. Connect messages are
retransmitted for up to 10 seconds after the IKE negotiation is over, ifo
response is received.
+ A series of test messages with various lengths is sent, so as to discover the
Path Maximum Transmission Unit (PMTU) of the connection. This may also
take up to 10 seconds, This tet is executed to ensure that TCP packets that
are too large are not sent. TCP packets that are too Large will be fragmented
‘and slow down performance,
Since various vendors implement IPSec tunnels in a number of different
‘methods, Administrators need to cope with different means of implementing the
IPSec framework, VPN Tunnel Sharing provides interoperability and scalability,
by controlling the number of VPN tunnels created between peer Gateways. There
are three available settings:
© One VPN Tunnel per each pair of hosts
* One VPN Tunnel per subnet pair
© One VPN Tunnel per Gateway pair
124
Check Point Security Engineering7
Tunnot Management
Tunnel-Management Configuration
Student Manual
‘Tunnel management is configured in the community object,
i ay
[See Foret
oe en
C bndtandedcia zene __ fei
C ovmeictieniecey Sif ana]
FF puaeAate cima ses
“erated fee 3
Teng a
Figure 32— Tunnel Management
125,————
“Advanced IPsec VPN and Remote Access
Permanent-Tunnel Configuration
Tracking options
To set VPN tunnels as permanent, select Set Permanent Tunnels. The following
Permanent Tunnel modes are then made available
+ Onall tunnels in the community
© Onall tunnels of specific Gateways
‘On specific tunnels in the community
‘To make all VPN tunnels permanent in a Community, select On all tunnels in
the community. To make all VPN tunnels of specific Gateways permanent,
select On all tunnels of specific Gateways, Select the specific Gateways you
‘want, and all VPN tunnels to the specific Gateway will be set as permanent.
‘Tracking options can be configured for specific Gateways’ VPN tunnels in the
Gateway tunnels properties screen. Use Community Tracking Option as the
default setting. You can select specific tracking options:
‘To configure specific tunnels in a Community to be permanent, select On
specific Tunnels in the community. Click the Set Permanent Tunnels button
For example, to make the tunnel between Remote-1-gw and Remote-3-gw
permanent, click in the cell that intersects the Remote-1-gw and Remote-3-g0
where a permanent tunnel is required.
4. Click Seleeted Tunnel Properties to display the Tunnel Properties screen:
2, Click Seleet these tunnels to be permanent tunnels
3. Click OK.
‘Several types of alerts can be configured to keep Administrators up-to-date on.
the status of VPN tunnels. Tracking settings can be configured on the Tunnel
“Management seteen of the Community Properties window for all VPN tunnels,
‘or they can be set individually when configuring the permanent tunnels
themselves, The different options are Log, Popup Alert, Mail Alert, SNMP Trap
‘Alert, and User Defined Alert. Choosing one of these alert types will enable
immediate identification of the problem and the ability to respond to these issues
more effectively.
126
Check Point Security EngineeringTunnel Management
Advanced Permanent-Tunnel Con
Several attributes allow for customization of tunnel tests and intervals for
permanent tunnels:
4. In SmartDashboard, select Global Properties > SmartDashboard Customi-
zation,
2. Click Configure. The Advanced configuration sereen is displayed.
3. Click VPN Advanced Properties > Tunnel Management to view the five
attributes.
VPN Tunnel Sharing Configuration
‘VPN Tunnel Sharing provides greater interoperability and scalability, by
controlling the number of VPN tunnels created between peer Gateways.
Configuration of VPN Tunnel Sharing can be set on both the VPN community
‘and Gateway objects. Tunnel Sharing is configured using the following settings:
* One VPN tunnel per each pair of hosts; A VPN tunnel is created for every
session initiated between every pair of hosts.
© One VPN tunnel per subnet pair; Once a VPN tunnel has been opened
between two subnets, subsequent sessions between the same subnets will
share the same VPN tunnel. This isthe default setting, and is compliant with
the IPSec industry standard
‘© One VPN tunnel per Gateway pair; One VPN tunnel is created between peer
Gateways and shared by all hosts behind each peer Gateway.
If there is a conflict between the tunnel properties of a VPN Community and a
Gateway object that is a member of that same Community, the “stricter” setting is
used. For example, a Gateway object that was set to one VPN Tunnel per each
pair of hosts, and a community object that was set to one VPN Tunnel per subnet
pair, VPN sharing, will use one VPN Tunnel per each pair of hosts.
Student Manual 127ey
‘and Remote Access,
‘Rdvanced IPsec VF
Troubleshooting
“The first step in troubleshooting a VPN tunnel and IKE negotiation is to ensure
packets destined for the VPN tunnel from the peer arrive atthe Security Gateway,
and vice versa, The Smart View Tracker log is a good way to confirm that IKE
packets arrive atthe Gateway. Ifthere are no messages in SmartView Tracker, fw
‘moni tor is helpful for confirming if IKE packets arrive and leave the Gateway,
Once you verify IKE packets arrive at both sides, un a debug for IKE trafic with
the vpn debug on command, Generate some trafic from your VPN Domain
to the peer’s VPN Domain, Ifthe die .e1g file does not contain useful
information, an invalid tunnel may have been initiated previously, and i is
necessary to remove related SA keys from the table
Use the vpn_ tu command to remove site-to-site IKE and/or IPSec keys and
initiate traffic across the tunnel, This should place useful information into
ike.elg. In the new ike .e1g file if you can identify on which packet the
IKE negotiation fails, you can check relevant configuration parameters and.
correct accordingly. Also, look at the vpnd..e2g file. This file contains useful
information about other errors that might have occurred on the VPN tunnel
establishment process,
128
Check Point Security Engineering_
VPN Debug
VPN Debug
vpn debug
‘Thecommand vpn debug contains multiple utilities for troubleshooting VPN
issues, The following lists all options for the command:
vpn debug < on [ DEBUG_TOPIC=level ] | off | ikeon [
- s size(Mb) 1] ixeoff | trune | truncon | truncoft
| timeon [ SECONDS ] | timeoff | ikefail [ -s
size(Mb) 1| mon | moff >
Run -help on the command to see a deseription of all the parameters. Below,
you can find details on some specific options of the vpn debug command.
Student Manuat 129“Ravenced IPsee VPN and Remote Access.
vpn debug on | off
vpn debug on—Tumon vpn debug, and write the output to the following
file: vpnd-e1g
vpn debug on [debug topic] «(debug level] sets the specified
TDERROR topic to the specified level, without affecting any other debug settings,
This may be used to turn specific topics on or off.
vpn debug on TDERROR_ALL_ALL=1,2,3,4,5 tums on default VPN
debugging, ic,, all TERROR output and default VPN topics, without affecting
any other debug settings
vpn debug off — Disable vpn debug.
vpn debug ikeon | ikeoff
vpn Log Files
vpn debug trunc
130
vpn debug ikeon—Tumon ike debug and write the output to the
following file: ike .elg
vpn debug ikeoff —Disable ike debug.
‘The ike -e1g file contains information about the negotiation process for IKE
encryption. The vpnd . eg contains verbose information regarding the
negotiation process and other encryption failures. VPN debug logging is enabled
using the vpn debug on command, The output of the debugging commands
\writes to two different locations, depending on what is being debugged:
+ IKE debugging is writen to $FWDIR/1og/ike.elg.
+ VPN debugging is writen to $FWDIR/Log/vpnd. lg.
When the vpn debug on command nuns, the output is written to
$PWDIR\10g\vpnd. el file by default.
(Check Point Security EngineeringVPN Debug
VPN Environment Variables
vpn
Student Manat
Setting environment variables to enable logging should only be performed in
circumstances where VPNs are fling. The following are the commands to enable
the variables:
+ Windows — set veN_DEBUG:
* Unix —set ven_pzEuc 1
In previous versions, Check Point recommended setting the environment
variables to enable VPN debugging. As of VPN-I NGX, vpn debug on is the
preferred method. Setting the environment variables is recommended as a
‘method for debugging, only if there is a VPN tunnel failure.
‘The vpn command displays and controls various aspects of a Gateway. The
‘able lists other options for the vpn command that can be useful when
troubleshooting/debugging a VPN related issue:
2 Description - i
Erases all CRLs (Centficate Revocation Lists) from
cache
‘pn eview Debiging tool for CRs
“ypa tunnel Displays alist of options to manage a VPN tunnel ses-
oe sion; wpa eu can be used (0 sop all VPN or inivid-
val tunnels,
‘pn dev | Attaches the VPN diver to fv diver seing vpn rv
‘0 off wil tear dowa all existing VPN tunel, 80 ca
tion shouldbe used wih this command. When vpn dr
is setto on all VPN tmnels are renegotiated beginning
IKE Phase
won ver A] | Biselays VPN version
‘pa accel _| Diplays operations on VPN Accelerator Card
‘pa compat Display compression/decompression salice
‘pn compet ‘Resets compresion/decompression sation
‘pa exper pid “Tol to expor p12 fom Gateway Cerificate
‘TABLE 2: vpn Command Options
BI—_—
‘Advanced IPsec VPN and Remote Access,
vpn tu
Comparing SAs
‘The command vpn tu is short for vpn tunnelut, and is useful for
deleting IPSec or IKE SAs to a specific peer or user without interrupting other
VEN acti
‘The following is a quick process to verify that you and a potential VPN partner
are configured correctly:
Enable VPN debugging on both your site and your partner's site with vp
debug on trune.
2, Usevpn tunnelutil (vpn tu) to remove all SAs for either the peer
with which you are about fo create the tunnel, or all tunnels.
3, Have your peer initiate the tunnel from is site to yours.
4, Use vpn tunnelutil (vpn tu) to remove all SAs for either the peer
with which you are about to create the tunnel, oral tunnels.
‘5. Initiate the tunnel from your site to your peer.
6. Disable debugging on both sites.
Examine ike .e1g and vpnd .e1g, as they will now contain records of the
SA sent by your gateway, as well as what was received from your
partner site,
132
(Check Point Security Engineering
—!eee
Examples
VPN Encryption Issues
‘Swdent Manual
VPN Debug
You have several site-to-site VPN tunnels among Gateways,
‘You want to remove the IKE SAs fora particular peer, without interrupting the
other VPNS, How do you do that?
Run vpn tu from the Gateway Command Line Interface, and select delete all
IPSec and IKE SAs for a given Peer (GW) option.
A typical issue with encryption is when Quick mode packet | fails with error
“No Proposal Chosen’ from the peer. This failure is usually caused when a peer
does not agree to the proposal fields, such as encryption strength or hash,
‘A Security Gateway agrees loosely to the proposal, when it is host or network-
based. Third-party vendors sometimes only agree to these proposals with strict
adhetence to defined parameters.
‘Another common problem is when a Security Gateway proposes a supernetted
network address as the VPN Domain to a Cisco Concentrator (or other vendor) in
phase 2. The Cisco device only agrees to a VPN Domain that matches its network
address and subnet mask. This issue is known as the Largest possible subnet
problem. Here are some troubleshooting steps for this issue:
* Check the Shared Tunnel settings in the Tunnel Management section of the
VPN community. Make sure both sides agree on either host based or subnet.
based.
Interoperable devices do not support the Gateway 10 Gateway option,
‘+ In GuiDbedit, change the following property to false.
ike_use_largest_possible_subnet
‘This will prevent Check Point from supernetting networks in the VPN
domain, The subnets defined in the network object should be used,
* Check for multiple network objects in the VPN domain that overlap. For
example, 10.1.1.1/24 and 10.0.0.0/8 are both in the VPN domain, It is,
possible that a packet sourced from 10.1.x.x will use 255,0.0.0 for the subnet
in phase 2 instead of 255.255.255.0,
+ In some cases, particularly when network overlaps exist in the VPN domain,
itis still required to modify the user . def file. See SecureKnowledge
solution sk19243 and sk30919 on Check Point's Web site:
https: //usercenter. checkpoint. com/support
133,ee
“Ravanced IPeee VPN and Remote Access,
Example 1
Example 2
Assume you have a site-to-site VPN between two Check Point Security
Gateways, They are managed by their own Management Servers. You sec a lot of
IKE Phase | failures in SmartView Tracker. You run IKE debug on one Gateway
and discover only one packet in Main made is transferred. There is no packet in
Main mode after packet 1, What might have caused this problem?
First, check VPN settings (including Encryption Algorithm, key length, and Hash
method) in the Community object. Make sure Phase I settings ate identical on
the Advanced settings in the
‘object, such as group 1 or group 2, aggressive mode, etc, They must
be defined identically on both sides.
‘You are configuring a site-to-site VPN from a Check Point Security Gateway to a
Cisco device. You see that traffic initiated from the VPN Domain inside the
Security Gateway is dropped with the error, “Packet is dropped as there is no
valid SA", The Cisco side is sending “Delete SA” to the Security Gateway. The
IKE debug indicates a Phase 2 (Quick mode) failure. What is causing the
misconfiguration?
‘A Quick mode failure usually indicates the VPN Domain is not configured
exactly the same for one or both peers. For example, if the Security Gateway's
VPN Domain is a Class B network, but the same network is defined with a Class
C subnet mask on the Cisco VPN configuration, then this type of error occurs.
134
(Check Point Security EngineeringPractice and Review
Practice and Review
Practice Labs
Lab 5: Configuring Site-to-Site VPNs with Third Party Certificates
Lab 6: Remote Access with Endpoint Security VPN,
Review Questions
1. What are the stages of a Phase 2 IKE exchange?
2. What is the advantage of Link Selection for VPN traffic?
3. What type of VPN communities can be explicitly defined as MEP VPNs?
Quick mode packet 1 fails with error “No Proposal Chosen” from the peer.
‘What is likely the cause?
Student Manual 135,—_— eee
“advanced IPsec VPN and Remote Access
‘Check Point Security EngineeringCHAPTER 6
Auditing and Reporting
Student Manual
137ee
‘Ruaiting and Reporting
Auditing and Reporting
Objectives
“The SmaitEvent Software Blade turns security information into action with real-
lime security event correlation and management for Check Point security
‘gateways and third-perty devices. SmartEvent’s unified event analysis identifies
tical security events from the clutter, while correlating events across all
security systems. Its automated aggregation and correlation of data not only
‘minimizes the time spent analyzing log data, but also isolates and prioritizes the
real security threats.
“The SmartReporter Software Blade centralizes reporting on network, security,
and user activity and consolidates the data into concise predefined and custom
built reports. Easy report generation and automatic distribution save time and
money,
© Create Events or use existing event definitions to generate reports on specific
network traffic using SmartReporter and SmartEvent in order to provide
industry compliance information (o management.
‘+ Using your knowledge of SmartEvent architecture and module
communication, troubleshoot report generation given command-tine tools
and debug-file information.
138
‘Check Point Security Engineering‘Auditing and Reporting Processes
Auditing and Reporting Processes
From the standpoint of a network or security administrator, their role is
‘completely guided by processes and procedures, and the need to document any
‘changes implemented on the corporate network. In order to be compliant with
industry standards, and corporate mandates, this documentation is a crucial part
of an administrator's job
Corporate governance, and the importance of efficient auditing and reporting,
which takes place throughout the lifecycle of compliance regulatory practices is
important.
ing and Reporting Standards
‘The Sarbanes-Oxley Act of 2002 outlines nine audit policies for IT compliance
checking, They ensure suspicious activity and system breaches are Kept in-check
by alerting corporate officials of potential threats. They include:
* Account logon,
* Logon
* Account Management
* Policy Change
© Process Tracking
* Object Access
© Privilege Use
© System Events
© Directory Service Access:
‘Student Manual 139I
“audlting and Reporting
Implementing these audit policies produces detailed records for the following IT
security aspects according to the Sarbanes-Oxley Act.
‘+ Password changes
# Changes to access rights to shares, files, folders, etc
«© Attempts of unauthorized access to computer system resources
+ Attempts of unauthorized access to information held in application systems
+ All intemal system activity, including logins, file accesses, and security
incidents
‘© Produce and retain logs recording exceptions and security-related events
+ Any attempts of unauthorized changes to IT systems
+ Unauthorized changes to key system files and eritical data
ms for user accounts, groups and
+ Changes to Active Directory permis
computer accounts
+ Unauthorized Aetive Directory access permissions
+ Any changes to users, groups, rights, and user account policies
+» Notifications of group policy changes
+ Authorized users attempts to perform unauthorized activities
© Permission changes in Active Directory
‘© User information, access information, date and time stamp
'* Real-time policy modifications
+ Last accessed dates for files and applications
Check Point’s reporting tools generate thousands of events which include
detailed log information. The automated processes in SmartEvent and
‘SmartReporter provides a way to ease the workload of filtering all this raw
‘material, to come up with a concise breakdown of meaningful data,
140
Check Point Security Engineering‘SmartEvent
SmartEvent
‘The Check Point SmartEvent Software Blade is 2 unified security event
management and analysis solution that delivers real-time, actionable threat
‘management information, Administrators can quickly identify critical security
‘events, stop threats directly from the event screen, and add protections on-the-fly
to remediate attacks, all via a single console.
Figure 83 — Smart€vent
‘The full SmartBvent Software Blade can monitor events for all Check Point
products and third party devices. It includes pre-defined queries and event
definitions for firewall, VPN, Endpoint Security, IPS, DLP, Identity Awareness
and Application Control,
Student Manual 141“Auditing and Reporting
SmartEvent Intro
‘SmartEvent is available as a software blade or an appliance, The following
‘management software blades are bundled in each SmartEvent appliance:
+ SmartEvent
+ SmartReporter
© Logging and Status
{As part of the Software Blade architecture, the original Eventia Analyzer product
‘name was changed to Event Correlation Software Blade. The Eventia Correlation
Software Blade is renamed to SmartEvent Software Blade to better represent the
product's unique value proposition.
The SmartEvent Intro Software Blade provides centralized, real-time, security
event correlation and management for a single Check Point Secusity Software
Blade. For example, you could purchase the SmartEvent Intro Software Blade for
either IPS or DLP event management.
‘The full reporting capabilities are a part of the SmartReporter Software Blade
(Gwhich is bundled with the full SmartEvent Software Blade). It is possible to
‘upgrade to the full SmartEvent version for full reporting. However, itis only
possible to install one SmartEvent Intro Software Blade per device. To obtain
monitoring and correlating firewall events, you would need the full SmartEvent
Software Blade.
142
Check Point Security Engineeringeee
‘SmartEvent Architecture
SmartEvent Architecture —
Three main components are responsible for producing the log consolidation,
correlation and analysis results:
* Correlation Unit (CU) — Analyzes logs looking for pattems according to
the installed Event Policy. When a threat pattern is identified, the CU
forwards an event to the Eventia Analyzer Server
+ Analyzer Server — Receives events from the CU and assigns a severity level
to the event. It invokes any defined automatic reactions, and adds the event to
the Events Database, which resides here, The severity level and automatic
reaction ate based on the Events Policy. In addition, it imparts certain objects
from the management server to define the internal network. Changes made to
the objects on the management server are reflected in the client. The Analyzer
Server defines automatic responses and manages the database,
+ Analyzer Client — The Windows GUI that displays the received events, and
‘manages them for filtering and status (1e., closed events). It provides fine-
tuning and installation of the Events Policy.
‘An example of how the deployment scenario might look in an enterprise
environment is the following:
Anstyzer
dheaoe Ys Raby
Figure 24 — Enterprise Environment
Student Manual 143,ne
“Auditing and Reporting
Component Communication Process
Before going into any depth about how SmartBvent processes work, note the
following different Check Point protocols, all of which are utilized here.
cy Tae ean :
Tea) PORES | tea oar
aA ‘orsec | Eww tesa
S| a ere 7
‘acne “oPGEC | Poplestonanieing
ea ‘Seu Part wanagene ans Warps Gosh Pol
Git isatore sec
ero ‘ike ELA li bere ones communion
FREE | an | RRS evaSRURU We ae corre ET
é | eres dtectbe eau
‘GuvenawaDetvery | anal | Passes eves Yom Creston Unto he hr
Gael Ti) era [Eanes ee 5
Figute 35 — Smart€vent Processes
Referring to the next graphic, note that the Analyzer Server provides the event
definitions by way of the Event Policy to the CU, which in tum, pulls the logs
originating from the log sources, i., third party log servers. The CU performs its
analysis based on the Event Policy and delivers the results to the Server. The
Server communicates this information to the client.
Te
Ever potey
Bron dei
(Gunrmtecd
2 [WinevenTocPLag
Figute 36 — Analyzer Server
“Ghent
144
Check Point Security Engineering;
SaaS
‘SmantEvont Architecture
Event Policy User Interface
‘As you can see, the Event Policy is fundamental to the workings of SmartEvent,
and deserves a closer look. In this section, we'll loak at how to edit event
properties in order to customize or tailor events to your organization,
“To open a properties window, from the Policy tab, right-click on an event, and
from the drop-down box, select Properties,
EX rearaatonsrensncwon SSAh~
1 Prpton stent
Figure 97 — Smartévent Policy
‘This opens the main Edit Event Definition window. There are five tabs used to
configure the event
We'll be paying close attention to the Filter tab.
sey one a asl
[| Gat bg | ot Fr] Gert
fee: feeaintenrntes
Figure 88 ~ Ecit Event Detntion
Student Manual 145‘Auditing and Reporting
‘The filter tab settings determine whether a log is considered for an event or not
[Events that don’t match the defined filters are discarded.
Figure 39 — Edit Event Definition
146 (Check Point Security Engineering‘Smartévent Architecture
In the Count Logs tab, you define the number of logs collected over a petiod of
time that determines a new event.
re
ame Jae Cave | et et | Uesiion|
Theresia
Ceettecietnimaiken a] wneccwceweromed a teu
1 fener rat te yor
(ies ia eee
Sceteny ners tre
sane
1 Uesunaenee cite [agctea See] sot carta,
‘ones
Figure 40 — Et Event Definition
‘When clicking on the Advaneed button from here, you can decide to keep an.
event open (i.e., Time to live), which means that after an event is generated, more
logs are accumulated to the event until the event falls below the threshold time.
Update ever dia star [5D 3 scones,
OT] ered |
Figure 41 — Even! Defniton Advanced
‘The Updated time means an event is updated after the designated length of time,
Actually, the event is reported several times:
© When created
© Upto five updates
© When its closed
Student Mamuat 147i
‘Auditing and Reporting
‘The Event Format tab permits mapping Event data to log fields so that the
actual Event is viewed with the corresponding (preferential) data,
frat
| etn
Figure 42 — Eult Event Definition
148 (Check Point Security EngineeringEee
‘SmartEvent Architecture
Finally, the GUI representation tab allows the administrator to define whieh
fields (and how wide the field) will display in the exception and exclusion
sections of the particular event policy.
Pest svt
oe | Fat. [casts | eet SUlepeen |
ax
Telinaen
dts cin,
ar
Pes
Figure 43 — Defining Events
‘Student Manzal 149‘Raditing and Reporting
‘When creating a new event, from the Event Definition Wizard, you can select an
event as the basis for the new event, or create a new event from scratch, If you
used the Save As option from the drop-down menu you saw earlier, you can
clone an existing event and then modily it for a new event.
vent Detinion
‘Shp tel?
item ert
(Cetin constant ne
(6 ats zee an icra wert
BES Beta
BG Scare
1B Tied Paty Dnces-Uner Cari Eves
A oan F Sante
i (2 Urmboaed Ey
(a) Homans
13 [2 Vine at
3 Frome
BE Won eva
1B Hom Booed Eve
13 G2 toma etd
Figure 44 — Event Definition Wizard - Step +
150 (Check Point Security Engineeringnee
‘SmartEvent Architecture
‘The wizard will guide you through setting up the basies of the event, such as
‘name and description. In addition, you can decide ifan event will be generated by
a single log that matches the event definition, or multiple logs. When making this
choice, ask yourself, “Is the receipt of a single log, enough to imply an event?”
= 2 22a
abc123 event definition
Slop 308
‘Seat il gerarte an eer shen the ever deitan mec bi
© analog Uses etng non ding on even haa a siglo afcatto
urea ever. such aalog teman DS poring an ack
up ge Use this etinn when deni an overt where mle ge we acura
‘mn a peosdc ma, uch po ean.
7 ieee ee | cae
Figure 45 — Event Defniion Wieard- Step 3
Student Manual 151“Auaiting and Reporting
‘The next step in the wizard guides you in building the filter. You start by
designating the source product, then choosing among the available log fields as a
condition for the match,
B s ol
abe123 event dfitition
Sep 15
‘her orleg whose Poa Sal canst. Check Point Security Gateway ©
‘elethe coro hal seed ten Check Poet Sac Galea sr anomie
tach: © Alcéediene C sey Canin
Figure 46 — Event Defintion Wizard - Action Filer
152 (Check Point Security Engineering‘Smartévent Architocture
Finally, you specify the threshold, time, distinct values and unique values
(ghd
abc123 event ceritlon
Sep of5
Osteen over shen at isst FZ}. ops cccurd over pated of [T= sxeonde
TT Each evr etraion may nave rape Eset Candee ening strani
{ig rncr ae perdi Ever Cason bwoed on fe aie fueled og ek,
For oxrpl.€ Sareea aocd, echleg wth adfaert cles Ni orale
te Evot Conte, henge ne oe seas be cmsadto te sm
Bt Gnadate
Set th filo which det Evert Candee wl be crested
s el
T ve utam tert Ett ate cates
eich | a Corea
Figure 47 — Event Definition Wizard - Stop 6
Clicking Finish will save the new event under the list of User Defined Events.
In order for it to take effect however, you must remember to install the event
policy from the Actions menu, option Install Event policy.
Student Manual 153“Auditing and Reporting
SmariReporter
‘The purpose of SmartReporteris to provide an understanding of important events
(traffic) occurring on the network, and the overall security impact of those
events. It provides:
High-level view, trends, reports
© Understanding of the details of each event
+ Integration with other tools to modify the security policies
© Manage events by state and owner
‘SmartReporter implements a Consolidation Policy, which goes over yout
origina, “raw” log file. It compresses similar events and writes the compressed
list of events into a relational database (the SmartReporter Database). This
database enables quick and efficient generation of a wide range of reports.
Figure 48 — SmartReport
154
(Check Point Security Engineering‘SmartReporter
A Consolidation Policy is similar to a Security Policy in terms ofits structure and
management, For example, both Rule Bases are defined through the
‘SmartDashboard’s Rules menu and use the same network objeets. In addition,
{just as Security Rules determine whether to allow or deny the connections that
‘match them, Consolidation Rules determine whether to store or ignore the logs
that match them. The key difference is that a Consolidation Policy is based on
logs, as opposed to connections, and has no bearing on security issues.
‘The Log Consolidation Solution diagram illustrates the Consolidation process,
defined by the Consolidation Policy.
Wor teueaaies
NCIC Nh
icicle nelle)
cers
eR j
Figure 49 — Log Consofiation
‘Afier the Security Gateways send theit logs to the Security Management server,
the Log Consolidator Engine collects them, scans them, filters out fields defined
as imelevant, merges records defined as similar and saves them to the
‘SmartReporter Database.
The Figure illustrates how the Consolidation Poliey processes logs: when a log
matches & Consolidation Rule, it is either ignated or stored. If it is ignored, no
record ofthis log is saved in the SmartReporter system, so its datais not available
for report generation. Ifit is stored, itis either saved as is (so all log fields can
later be represented in reports), or consolidated to the level specified by the Rule,
Student Manual 155————_—
“Raditing and Reporting
Report Types
156
‘The consolidation is performed on two levels: the interval at which the fog was
created, and the log fields whose original values should be retained. When
several logs matching a specific Rule are recorded within a predefined interval,
the values of their relevant fields are saved “as is", while the values of their
irrelevant fields are merged (for example, “consolidated”) together.
‘The SmartReporter server can then extract the consolidated records matching 2
specific report definition from the SmartReporter Database and present them in a
report layout
‘Two types of reports can be created:
‘+ Standard Reports — The Standard Reports are generated from information
in log files through the Consolidation process to yield relevant analysis of
activity
‘+ Express Reports — Express Reports are generated from SmartView Monitor
History files and are produced much more quickly.
‘SmartReporter Standard Reports are supported by two Clients:
‘+ SmartDashboard Log Consolidator — manages the Log Consolidation
rales
© SmartReporter Client — generates and manages reports,
‘The interaction between the SmartReporter client and Server components applies
both to a distributed installation, where the Security Management server and
‘SmartReporters Server components are installed on two different machines, and
to a standalone installation, in which these Software Blades are installed on the
same machine,
‘Cheek Point Security EngineeringPractice and Review
Practice and Review
Practice Lab
Lab 7; SmartEvent and SmartReporter
Review Questions
4. What does the SmartReporter Consolidation Policy do?
2. What isthe difference between a Consolidation Policy, and a Security Policy?
3. When is an event reported?
Student Manual 157“Ruditing and Reporting
158 (Cheek Point Security EngineeringAppendix A
Gaia Maintenance
Student Manual
159Gaia Maintenance
Licenses
Licenses can be added or deleted using the:
© Maintenance > Licenses page of the WebUL
> Command line by running: eplic db_add or eplic det.
Note: While all the SecurePlatform eplic commands are available in
Gaia, they are not grouped into a Gaia feature, To see a list of
available commands and their parameters type oplic and press,
Enter.
Configuring Licenses - WebUI
Ifyou need to obtain a license, visit the User Center.
Adding a license:
4. In the tree view, eliek Maintenance > Licenses.
2, Click New.
‘The Add License window opens.
3. Enter the license data manually, or click Paste License to enter the data auto-
matically,
‘The Paste License button only shows in Internet Explorer. For other browsers,
paste the license strings into the empty text field.
expen st
Sk eae:
Snes Kay:
4. Click OK.
160 Check Point Security Engineeringeee
Deleting a license:
4. In the tree view, click Maintenance > Licenses.
2, Selecta license in the table
3. Click Delete,
Configuring Licenses - CLI (cplic)
‘The eplic command and all its derivatives relate to Check Point license
‘management.
Note: The SmartUpdate GUI is the recommended way of managing
licenses.
All eplic commands are located in SCPDIR/bin, License Management is divided
into three types of commands:
© Local licensing commands are executed on local machines.
* Remote licensing commands are commands which affect remote
‘machines are executed on the Security Management server.
© License repository commands are executed on the Security
‘Management server.
Syntax
Local Licensing:
eplic put ...
eplic del (-F coutput £i1e>)
eplic print {-h hetpl [-n ncheader]
Lex print efgnature:
[-e epel
[-P coutput fites) (+t )
Lop preatuces!
[-b print only Domain scenses]
epic chack ...
eplic contract ...
Remote Licensing:
eplic put