SlideShare une entreprise Scribd logo
1  sur  209
1
©2020 Check Point Software Technologies Ltd.
CHECK POINT CERTIFIED
SECURITY ADMINISTRATOR
R80.40 CCSA
2
©2020 Check Point Software Technologies Ltd.
Check Point: The Largest Global Cyber Security Company
Global Leader – 100,000+ Customers, 88+ Countries, 6,200+ Partners
Over 25 years of cutting edge technologies, Industry’s most visionary player
Traded on Nasdaq since 1996 - CHKP
5000+ Employees worldwide, top talent
Innovation leadership - more than twice the developers of closest competitor
TRUSTED BY FORTUNE 500 COMPANIES
3
©2020 Check Point Software Technologies Ltd.
Mission Statement
BUILDING SECURITY FOR THE FUTURE
SECURE ANY ENVIRONMENT WE OPERATE IN
DO IT EFFICIENTLY KEEPING THE ATTACKS OUTSIDE
4
©2020 Check Point Software Technologies Ltd.
• Infinity architecture: Consolidated security platform providing full threat prevention
across the organization
• New technology: Assist customers to securely innovate and grow by deploying new
security technologies
• Broader reach: Provide more companies with the ability to prevent attacks
Check Point Strategy
5
©2020 Check Point Software Technologies Ltd.
Best Threat Prevention Across Entire Enterprise
MOBILE
Shared Threat Intelligence
Consolidated Security
Management
ENDPOINT
Hybrid Cloud
NETWORK
Perimeter & Data centers
CLOUD
6
©2020 Check Point Software Technologies Ltd.
PREFACE
CCSA R80.40
7
©2020 Check Point Software Technologies Ltd.
Check Point CHECKMATES
CHECKMATES is a community of people passionate about cyber
security!
It is an interactive platform with a large crowd of users where they can discuss various topics, talk about
challenges they face, develop and share API tools and scripts, discuss benefits of products and
solutions, exchange ideas, ask questions related to all Check Point products and services, and
interconnect through local CheckMates Live (local user group) events.
To boost your professional career with Check Point, become a member of the CheckMates community
and share your thoughts and experiences, follow technology trends, learn about the most recent
products and features, and participant in your local CheckMates community. Use your UserCenter
account to sign in and get started: https://community.checkpoint.com/
8
©2020 Check Point Software Technologies Ltd.
CCSA is recommended for the following professionals:
 System Administrators
 Support Analysis
 Network Engineers
9
©2020 Check Point Software Technologies Ltd.
CCSA Course Chapters
• Chapter 1: Introduction to Check Point Technology
• Chapter 2: Introduction to Check Point Deployment
• Chapter 3: Check Point Management Operations
• Chapter 4: Licensing
• Chapter 5: Security Policy Management
• Chapter 6: Policy Layers
• Chapter 7: Managing User Access
• Chapter 8: Working with NAT
• Chapter 9: Traffic Visibility
• Chapter 10: Monitoring System States
• Chapter 11: Security Events
• Chapter 12: Basic Concepts of VPN
• Chapter 13: Working with ClusterXL
• Chapter 14: Compliance Tasks
10
©2020 Check Point Software Technologies Ltd.
Internal
DMZ
EXT
Internet
Name: A-GW-01
Mgmt Address: 10.1.1.2/24
Int Address: 192.168.11.2/24
Sync Address: 192.168.10.2/24
Ext Address: 203.0.113.2/24
DMZ Address: 192.168.12.2/24
Default GW: 203.0.113.254
SYNC
Name: A-GW-02
Mgmt Address: 10.1.1.3/24
Int Address: 192.168.11.3/24
Sync Address: 192.168.10.3/24
Ext Address: 203.0.113.3/24
DMZ Address: 192.168.12.3/24
Default GW: 203.0.113.254
EXT
NAT
Management
Internal
Name: A-GW-Cluster
Mgmt VIP: 10.1.1.1/24
Int VIP: 192.168.11.1/24
Ext VIP: 203.0.113.1/24
DMZ VIP: 192.168.12.1/24
IP Address: 10.1.1.201/24
Default GW: 10.1.1.1
IP Address: 10.1.1.101/24
Default GW: 10.1.1.1
Name: A-Host
IP Address: 192.168.11.201/24
Default GW: 192.168.11.1
Name: A-LDAP
IP Address: 192.168.11.101/24
Default GW: 192.168.11.1
Name: A-DMZ
IP Address: 192.168.12.101/24
Default GW: 192.168.12.1 Name: B-GW
Mgmt Address: Interface Disabled
Int Address: 192.168.21.1/24
Sync Address: interface Disabled
Ext Address: 203.0.113.100/24
Default GW: 203.0.113.254
Name: B-Host
IP Address: 192.168.21.201/24
Default GW: 192.168.21.1
eth0
eth1
eth2
eth3
eth4
eth3
eth1
Name: Router
IP Address: 203.0.113.254/24
11
©2020 Check Point Software Technologies Ltd.
Security administrators fill one of the most important roles in
the information technology (IT) industry. They oversee issues
related to IT security safety and ensure organizations’
computer networks and systems remain protected from all
types of cyber threats. This includes configuring policy and
adding passwords to servers, setting up firewalls and anti-virus
protection, and restricting what users can and cannot do on the
network.
THE ROLE OF
THE SECURITY
ADMINISTRATOR
12
©2020 Check Point Software Technologies Ltd.
INTRODUCTION
TO CHECKPOINT TECHNOLOGY
Chapter One
13
©2020 Check Point Software Technologies Ltd.
• Describe the key elements of
Check Point’s unified security
management architecture.
• Learn how Check Point firewalls
are managed and network traffic is
monitored.
• Gain insight on how Check Point
security features are enabled and
policies applied.
Learning
Objectives
14
©2020 Check Point Software Technologies Ltd.
Security Architecture
When connecting to the Internet,
protecting the network against
intrusion is of critical importance.
The most effective way to secure
the Internet link is to put a
Firewall system between the local
network and the Internet.
• Security Management Server
• SmartConsole
• Security Gateway
15
©2020 Check Point Software Technologies Ltd.
Controlling Network Traffic
• Packet Filtering
• Stateful Inspection
• Application Layer Firewall
The Firewall, or the Security Gateway
with a Firewall enabled,
will deny or permit traffic based on
rules defined in the Security
Policy. The following technologies
are used to deny or permit
network traffic:
16
©2020 Check Point Software Technologies Ltd.
Packet Filtering
Handling individual packets,
the packet filter firewall
applies rules to determine
whether a packet can be
allowed or disallowed. The
firewall examines each
packet based on the following
criteria:
• Source IP address
• Destination IP address
• TCP/UDP source port
• TCP/UDP destination port
17
©2020 Check Point Software Technologies Ltd.
Controlling Network Traffic
The most basic form of a Firewall.
PACKET FILTERING
Packets include the following
elements:
• Source address
• Destination address
• Source port
• Destination port
• Protocol
18
©2020 Check Point Software Technologies Ltd.
Controlling Network Traffic
Technology developed
and patented by Check Point.
STATEFUL INSPECTION
• Examines the context of a packet.
• Monitors the state of the connect.
• Uses Check Point’s INSPECT Engine to extract
state related information from the packet.
19
©2020 Check Point Software Technologies Ltd.
Controlling Network Traffic
• Examines the packet
header
• Requires two rules for
each connection
Packet Filtering
• Examines the packet
header and contents
• Only one rule required
for each connection
Stateful Inspection
How does Stateful Inspection and Packet Filtering Differ?
20
©2020 Check Point Software Technologies Ltd.
Controlling Network Traffic
Includes the traditional functions of Packet Filtering
and Stateful Inspection.
• Provides granular level
filtering, antivirus scanning,
and access control.
• Inspects traffic through the
lower layers of the TCP/IP
model and up to and including
the application layer.
APPLICATION FIREWALL
21
©2020 Check Point Software Technologies Ltd.
Review Questions
1. What are the three main components of the Check Point Architecture?
2. Why are State tables key components of the Stateful Inspection technology?
3. What is the main purpose for Security Gateways?
22
©2020 Check Point Software Technologies Ltd.
INTRODUCTION TO
CHECK POINT
DEPLOYMENT
Chapter Two
23
©2020 Check Point Software Technologies Ltd.
• Understand Check Point
deployment options.
• Describe the basic functions of the
Gaia operating system.
Learning
Objectives
24
©2020 Check Point Software Technologies Ltd.
Deployment Options
Check Point appliances and open servers are the two main options for deploying
Check Point technology. These deployment options encompass the processes
typical of launching new software or hardware in an environment that runs properly.
Examples include the following:
• Check Point Appliances
• Open Servers
• Cloud Computing
• Scalable Platforms
Maestro Hyperscale Orchestrator
25
©2020 Check Point Software Technologies Ltd.
Check Point Appliances
Strong and proven, Check Point security appliances provide reliable
services for thousands of businesses worldwide.
• Small Business and Branch Office
• Enterprise Network Security
• Data Center Security Systems
• Chassis Systems
• Rugged Appliances
• And More Rugged Appliance
26
©2020 Check Point Software Technologies Ltd.
Deployment Considerations
Each component in the
network topology is
distinguished by its IP address
and netmask. The
combination of components
and their respective IP
information make up the
network topology.
27
©2020 Check Point Software Technologies Ltd.
Standalone Deployment
In a Standalone deployment, the Security Management Server and
Security Gateway are installed on the same computer or appliance.
1 Security Management Server
2 Standalone Server
3 Security Gateway Component
28
©2020 Check Point Software Technologies Ltd.
Distributed Deployment
In a Distributed deployment, the Security Gateway and the Security
Management Server are installed on different computers or
appliances.
1 Security Management Server
2 Network Connection
3 Security Gateway
29
©2020 Check Point Software Technologies Ltd.
Bridge Mode Deployment
A Bridge Mode deployment adds a Security Gateway to an existing
environment without changing IP routing.
1 Switch
2 Router
3 Security Gateway Firewall bridging Layer-2
traffic over the one IP address, with a subnet
on each side using the same address.
30
©2020 Check Point Software Technologies Ltd.
Introduction to the Gaia Operating System
Gaia is Check Point’s operating system for all Check Point appliances
and open servers. It supports the full portfolio of Check Point Software
Blades, gateways, and security management products. It also supports:
• IPv4 and IPv6 network protocols
• High connection and virtual systems capacity (64 bits)
• Load sharing
• High availability
• Dynamic and multi-cast routing
31
©2020 Check Point Software Technologies Ltd.
Gaia Portal
The Gaia Portal (also known
as WebUI) is an advanced,
web-based interface
used to configure Gaia
platforms. A majority of
system configuration tasks
can be done through the
Gaia Portal.
32
©2020 Check Point Software Technologies Ltd.
Gaia Portal Users Page
The Gaia Portal and CLI can be used to manage user accounts
and perform the following actions:
• Add users to your Gaia system
• Edit the home directory of the user
• Edit the default shell for a user
• Assign a password to a user
• Assign privileges to users
33
©2020 Check Point Software Technologies Ltd.
• AdminRole
Gives the user read/write
access to all features.
• MonitorRole
Gives the user read-only
access to all features.
Gaia Pre-Defined Roles
Gaia includes these pre-defined roles:
34
©2020 Check Point Software Technologies Ltd.
Roles are defined on the
“Add Role” page of the
WebUI. To add a new role
or change an existing
role select User
Management > Roles in
the WebUI navigation tree.
Gaia Portal Add Role Window
35
©2020 Check Point Software Technologies Ltd.
• Gaia provides the ability to
directly receive updates for
licensed Check Point
products.
• With the Check Point
Upgrade Service Engine
(CPUSE), you can
automatically update
Check Point products.
Check Point Upgrade Service Engine
36
©2020 Check Point Software Technologies Ltd.
Assigning Users to Roles in Gaia Portal
1. Select User Management > Roles in the WebUI navigation tree.
2. Click Assign Members.
3. In the Assign Members to Role window:
• Double-click on user in the Available Users list to add that user to the role.
• Double-click on user in the Users with Role list to remove that user from the role.
37
©2020 Check Point Software Technologies Ltd.
Gaia Commands
Commands have the following syntax: operation feature parameter
• To view all commands that the user has permissions to run:
show commands
• To view a list of all features:
show commands feature <TAB>
• To show all possible operations:
show commands op <SPACE> <TAB>
• To show the full system version information:
show version all
38
©2020 Check Point Software Technologies Ltd.
Review Questions
1. What’s the difference between a Distributed Deployment and a Stand Alone Deployment?
2. What are the two main options for deploying Check Point technology?
3. What is a private package?
39
©2020 Check Point Software Technologies Ltd.
Lab 2.1- Installation of Primary Management Server
Site Alpha Site Bravo
Internal
DMZ
EXT
C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y
Internet
Name: A-GW-01
Mgmt Address: 10.1.1.2/24
Int Address: 192.168.11.2/24
Sync Address: 192.168.10.2/24
Ext Address: 203.0.113.2/24
DMZ Address: 192.168.12.2/24
Default GW: 203.0.113.254
SYNC
Name: A-GW-02
Mgmt Address: 10.1.1.3/24
Int Address: 192.168.11.3/24
Sync Address: 192.168.10.3/24
Ext Address: 203.0.113.3/24
DMZ Address: 192.168.12.3/24
Default GW: 203.0.113.254
EXT
NAT
Management
Internal
Name: A-GW-Cluster
Mgmt VIP: 10.1.1.1/24
Int VIP: 192.168.11.1/24
Ext VIP: 203.0.113.1/24
DMZ VIP: 192.168.12.1/24
Name: A-GUI
IP Address: 10.1.1.201/24
Default GW: 10.1.1.1
Name: A-SMS
IP Address: 10.1.1.101/24
Default GW: 10.1.1.1
Name: A-Host
IP Address: 192.168.11.201/24
Default GW: 192.168.11.1
Name: A-LDAP
IP Address: 192.168.11.101/24
Default GW: 192.168.11.1
Name: A-DMZ
IP Address: 192.168.12.101/24
Default GW: 192.168.12.1 Name: B-GW
Mgmt Address: Interface Disabled
Int Address: 192.168.21.1/24
Sync Address: interface Disabled
Ext Address: 203.0.113.100/24
Default GW: 203.0.113.254
Name: B-Host
IP Address: 192.168.21.201/24
Default GW: 192.168.21.1
eth0
eth1
eth2
eth3
eth4
eth3
eth1
Name: Router
IP Address: 203.0.113.254/24
40
©2020 Check Point Software Technologies Ltd.
Performance Objectives:
• Configure the Security Management Server
• Use the WebUI to run the First Time Wizard
• Install SmartConsole
Tasks:
• Install the Gaia OS
• Configure the system as a Security Management Server
Lab 2.1: Installation of Primary Management Server
41
©2020 Check Point Software Technologies Ltd.
Lab 2.2- Configuration of a Security Gateway
Site Alpha Site Bravo
Internal
DMZ
EXT
C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y
Internet
Name: A-GW-01
Mgmt Address: 10.1.1.2/24
Int Address: 192.168.11.2/24
Sync Address: 192.168.10.2/24
Ext Address: 203.0.113.2/24
DMZ Address: 192.168.12.2/24
Default GW: 203.0.113.254
SYNC
Name: A-GW-02
Mgmt Address: 10.1.1.3/24
Int Address: 192.168.11.3/24
Sync Address: 192.168.10.3/24
Ext Address: 203.0.113.3/24
DMZ Address: 192.168.12.3/24
Default GW: 203.0.113.254
EXT
NAT
Management
Internal
Name: A-GW-Cluster
Mgmt VIP: 10.1.1.1/24
Int VIP: 192.168.11.1/24
Ext VIP: 203.0.113.1/24
DMZ VIP: 192.168.12.1/24
Name: A-GUI
IP Address: 10.1.1.201/24
Default GW: 10.1.1.1
Name: A-SMS
IP Address: 10.1.1.101/24
Default GW: 10.1.1.1
Name: A-Host
IP Address: 192.168.11.201/24
Default GW: 192.168.11.1
Name: A-LDAP
IP Address: 192.168.11.101/24
Default GW: 192.168.11.1
Name: A-DMZ
IP Address: 192.168.12.101/24
Default GW: 192.168.12.1 Name: B-GW
Mgmt Address: Interface Disabled
Int Address: 192.168.21.1/24
Sync Address: interface Disabled
Ext Address: 203.0.113.100/24
Default GW: 203.0.113.254
Name: B-Host
IP Address: 192.168.21.201/24
Default GW: 192.168.21.1
eth0
eth1
eth2
eth3
eth4
eth3
eth1
Name: Router
IP Address: 203.0.113.254/24
42
©2020 Check Point Software Technologies Ltd.
Performance Objectives:
• Install the Alpha Cluster using the network detailed in
the course topology
Tasks:
• Install Gaia on the A-GW-01 and A-GW-02
• Configure the Security Gateway with the First Time Configuration
Wizard
Lab 2.2: Configuration of a Security Gateway
43
©2020 Check Point Software Technologies Ltd.
CHECK POINT
MANAGEMENT
OPERATIONS
Chapter Three
44
©2020 Check Point Software Technologies Ltd.
• Receive introduction to Security
Internal Communication (SIC).
• Recognize SmartConsole
features, functions, and tools.
• Understand how SmartConsole is
used by administrators to grant
permissions and user access.
Learning
Objectives
45
©2020 Check Point Software Technologies Ltd.
Network Communication Secure Internal
Communication (SIC)
• Creates trusted connections.
• Required for policy installation and to send logs.
• SIC methods include:
• Certificates
• Standards-based SSL for the creation of secure channels
• 3DES or AES128 for encryption
46
©2020 Check Point Software Technologies Ltd.
Administrative Tasks in SmartConsole
• Manage Security Policies
• Monitor Events
• Install Updates
• Add New Devices and Appliances
• Manage Multi-Domain Environments
47
©2020 Check Point Software Technologies Ltd.
The SmartConsole
SmartConsole is a Graphical User
Interface (GUI) used to manage the
objects that represent network
elements, servers, and gateways.
These administrative activities are
organized into the following tabs:
• Gateways & Servers
• Security Policies
• Logs & Monitor
• Manage & Settings
48
©2020 Check Point Software Technologies Ltd.
Logs & Monitor View
The Logs & Monitor tab
allows you to view graphs
and pivot tables in
an organized dashboard,
search through logs, and
schedule customizable
reports.
49
©2020 Check Point Software Technologies Ltd.
Review Questions
1. Name one task that takes place in the Gateways & Servers tab:
2. When does a session occur?
50
©2020 Check Point Software Technologies Ltd.
Lab 3.1- Establishing Secure Internal Communication
Site Alpha Site Bravo
Internal
DMZ
EXT
C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y
Internet
Name: A-GW-01
Mgmt Address: 10.1.1.2/24
Int Address: 192.168.11.2/24
Sync Address: 192.168.10.2/24
Ext Address: 203.0.113.2/24
DMZ Address: 192.168.12.2/24
Default GW: 203.0.113.254
SYNC
Name: A-GW-02
Mgmt Address: 10.1.1.3/24
Int Address: 192.168.11.3/24
Sync Address: 192.168.10.3/24
Ext Address: 203.0.113.3/24
DMZ Address: 192.168.12.3/24
Default GW: 203.0.113.254
EXT
NAT
Management
Internal
Name: A-GW-Cluster
Mgmt VIP: 10.1.1.1/24
Int VIP: 192.168.11.1/24
Ext VIP: 203.0.113.1/24
DMZ VIP: 192.168.12.1/24
Name: A-GUI
IP Address: 10.1.1.201/24
Default GW: 10.1.1.1
Name: A-SMS
IP Address: 10.1.1.101/24
Default GW: 10.1.1.1
Name: A-Host
IP Address: 192.168.11.201/24
Default GW: 192.168.11.1
Name: A-LDAP
IP Address: 192.168.11.101/24
Default GW: 192.168.11.1
Name: A-DMZ
IP Address: 192.168.12.101/24
Default GW: 192.168.12.1 Name: B-GW
Mgmt Address: Interface Disabled
Int Address: 192.168.21.1/24
Sync Address: interface Disabled
Ext Address: 203.0.113.100/24
Default GW: 203.0.113.254
Name: B-Host
IP Address: 192.168.21.201/24
Default GW: 192.168.21.1
eth0
eth1
eth2
eth3
eth4
eth3
eth1
Name: Router
IP Address: 203.0.113.254/24
51
©2020 Check Point Software Technologies Ltd.
Performance Objects:
• Demonstrate how the Security Management Server
and Gateways communicate
• Test SIC status
Tasks:
• Create the Cluster and Gateway objects in SmartConsole
• Establish SIC
Lab 3.1: Establishing Secure Internal Communication
52
©2020 Check Point Software Technologies Ltd.
Lab 3.2- Administrator Access
Site Alpha Site Bravo
Internal
DMZ
EXT
C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y
Internet
Name: A-GW-01
Mgmt Address: 10.1.1.2/24
Int Address: 192.168.11.2/24
Sync Address: 192.168.10.2/24
Ext Address: 203.0.113.2/24
DMZ Address: 192.168.12.2/24
Default GW: 203.0.113.254
SYNC
Name: A-GW-02
Mgmt Address: 10.1.1.3/24
Int Address: 192.168.11.3/24
Sync Address: 192.168.10.3/24
Ext Address: 203.0.113.3/24
DMZ Address: 192.168.12.3/24
Default GW: 203.0.113.254
EXT
NAT
Management
Internal
Name: A-GW-Cluster
Mgmt VIP: 10.1.1.1/24
Int VIP: 192.168.11.1/24
Ext VIP: 203.0.113.1/24
DMZ VIP: 192.168.12.1/24
Name: A-GUI
IP Address: 10.1.1.201/24
Default GW: 10.1.1.1
Name: A-SMS
IP Address: 10.1.1.101/24
Default GW: 10.1.1.1
Name: A-Host
IP Address: 192.168.11.201/24
Default GW: 192.168.11.1
Name: A-LDAP
IP Address: 192.168.11.101/24
Default GW: 192.168.11.1
Name: A-DMZ
IP Address: 192.168.12.101/24
Default GW: 192.168.12.1 Name: B-GW
Mgmt Address: Interface Disabled
Int Address: 192.168.21.1/24
Sync Address: interface Disabled
Ext Address: 203.0.113.100/24
Default GW: 203.0.113.254
Name: B-Host
IP Address: 192.168.21.201/24
Default GW: 192.168.21.1
eth0
eth1
eth2
eth3
eth4
eth3
eth1
Name: Router
IP Address: 203.0.113.254/24
53
©2020 Check Point Software Technologies Ltd.
Performance Objectives:
• Create multiple administrators and apply different roles and
permissions for current administration
Tasks:
• Create new administrators with varying permission profiles
• Configure IPS
• Test administrator access based on assigned profiles
• View concurrent administrator activities
• Disconnect an administrator session
Lab 3.2: Administrator Access
54
©2020 Check Point Software Technologies Ltd.
LICENSING
Chapter Four
55
©2020 Check Point Software Technologies Ltd.
• Learn how Check Point security
solutions and products work and
how they protect networks.
• Understand licensing and contract
requirements for Check Point
security products.
Learning
Object
56
©2020 Check Point Software Technologies Ltd.
Licensing Overview
Components of a License:
• Features and functionality of purchased product
• Specifies its terms of use
• Maximum number of users, devices and/or IP addresses allotted for
the product
• Signature key
• Certification key
• Service contract data
57
©2020 Check Point Software Technologies Ltd.
Central & Local Licenses
• Central licenses require
an administrator to
designate a gateway for
attachment.
• Local licenses are
automatically attached to
their respective Security
Gateways.
58
©2020 Check Point Software Technologies Ltd.
Using the Gaia First
Time Configuration
Wizard, the appliance
connects to the Check
Point User Center and
downloads all
necessary licenses
and contracts.
License Activation
59
©2020 Check Point Software Technologies Ltd.
The automatic licensing
feature performs the following
operations:
• Verifies Licenses
• Activates New Licenses
• Automatically Adds New Blades
Automatic Licensing
60
©2020 Check Point Software Technologies Ltd.
Using SmartUpdate
SmartUpdate tabs are divided into a tree structure that displays the
packages installed and the licenses attached to each managed
Security Gateway. The tree has the following three levels:
• Root
• Second
• Third
61
©2020 Check Point Software Technologies Ltd.
Add & Install Licenses
To install a license, you must first add it to the License & Contract
Repository:
1. Launch SmartDistributer.
2. Navigate to the Licenses
& Contracts tab.
3. From the Launch menu,
choose Licenses &
Contracts > Add
License.
62
©2020 Check Point Software Technologies Ltd.
Steps to Export a License
1. In SmartUpdate, select a
license from the License
Repository and right-click.
2. From the menu, select
Export License to File.
3. In the Choose File to Export
License(s) To window, name
the file or select an existing file
and browse to the desired
location.
63
©2020 Check Point Software Technologies Ltd.
License Status
SmartConsole allows
you to quickly
reference the license
status for each
Software Blade per
gateway.
64
©2020 Check Point Software Technologies Ltd.
Saving & Exporting License Status
You may also save the
status information as a
PDF report or export
the information to a file.
65
©2020 Check Point Software Technologies Ltd.
License Reports
To generate a report of all
licenses allocated for your
full network environment:
1. Launch SmartConsole.
2. In the License Repository,
right-click the object.
3. From the menu bar, select
Action and then License Report.
4. Select the desired report
format to be generated.
66
©2020 Check Point Software Technologies Ltd.
Service Contracts
The Service
Contract file
enables
compliance
with current
Check Point
licensing
standards.
67
©2020 Check Point Software Technologies Ltd.
Updating Contracts
Contracts can be
updated in
SmartUpdate by
using the Licenses
& Contracts option
provided under the
Licenses & Contract
tab menu.
68
©2020 Check Point Software Technologies Ltd.
Review Questions
1. Name the three types of Software Containers:
2. What are Subscription Blades?
3. Name one reason for generating and installing a new license?
69
©2020 Check Point Software Technologies Ltd.
Lab 4.1- Managing Licensing & Contracts in SmartUpdate
Site Alpha Site Bravo
Internal
DMZ
EXT
C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y
Internet
Name: A-GW-01
Mgmt Address: 10.1.1.2/24
Int Address: 192.168.11.2/24
Sync Address: 192.168.10.2/24
Ext Address: 203.0.113.2/24
DMZ Address: 192.168.12.2/24
Default GW: 203.0.113.254
SYNC
Name: A-GW-02
Mgmt Address: 10.1.1.3/24
Int Address: 192.168.11.3/24
Sync Address: 192.168.10.3/24
Ext Address: 203.0.113.3/24
DMZ Address: 192.168.12.3/24
Default GW: 203.0.113.254
EXT
NAT
Management
Internal
Name: A-GW-Cluster
Mgmt VIP: 10.1.1.1/24
Int VIP: 192.168.11.1/24
Ext VIP: 203.0.113.1/24
DMZ VIP: 192.168.12.1/24
Name: A-GUI
IP Address: 10.1.1.201/24
Default GW: 10.1.1.1
Name: A-SMS
IP Address: 10.1.1.101/24
Default GW: 10.1.1.1
Name: A-Host
IP Address: 192.168.11.201/24
Default GW: 192.168.11.1
Name: A-LDAP
IP Address: 192.168.11.101/24
Default GW: 192.168.11.1
Name: A-DMZ
IP Address: 192.168.12.101/24
Default GW: 192.168.12.1 Name: B-GW
Mgmt Address: Interface Disabled
Int Address: 192.168.21.1/24
Sync Address: interface Disabled
Ext Address: 203.0.113.100/24
Default GW: 203.0.113.254
Name: B-Host
IP Address: 192.168.21.201/24
Default GW: 192.168.21.1
eth0
eth1
eth2
eth3
eth4
eth3
eth1
Name: Router
IP Address: 203.0.113.254/24
70
©2020 Check Point Software Technologies Ltd.
Performance Objective:
• Validate existing licenses for products installed on the network.
Tasks:
• Verify the status of existing licenses in SmartConsole
• Import Licenses
• Attach Licenses
• Verify the status of existing licenses in Gaia portal
Lab 4.1: Managing Licensing & Contracts in
SmartUpdate
71
©2020 Check Point Software Technologies Ltd.
SECURITY POLICY
MANAGEMENT
Chapter Five
72
©2020 Check Point Software Technologies Ltd.
• Describe the essential elements of
a Security Policy.
• Understand how traffic inspection
takes place in a unified Security
Policy.
• Summarize how administration
roles and permissions assist in
managing policy.
• Recall how to implement Check
Point backup techniques.
Learning
Objectives
73
©2020 Check Point Software Technologies Ltd.
A Security Policy consists of a set of rules that define network
security using a Rule Base. Once a Rule Base is defined, the
Security Policy can be distributed to all Security Gateways
across a network. Rules are comprised of network objects such
as gateways, hosts, networks, routers, and domains and
specifies the source, destination, service, and action to be
taken for each session.
Rules
74
©2020 Check Point Software Technologies Ltd.
A default rule is added when you add a rule to the Rule Base.
These rules are configured using all objects, services and
users installed on your database.
Default Rule – AQUI!!!!
75
©2020 Check Point Software Technologies Ltd.
Object Management
• Administrators can
add, edit, delete,
and clone objects.
• The Object Explorer
window in
SmartConsole
allows you to create
new objects and edit
existing objects.
76
©2020 Check Point Software Technologies Ltd.
Configuring Anti-Spoofing
The Topology tab of the
Interface Properties window
allows you to configure Anti-
Spoofing properties of a
gateway.
77
©2020 Check Point Software Technologies Ltd.
• Cleanup Rule — A Cleanup rule is recommended to determine how
to handle connections not matched by the rules above it in the Rule
• Stealth Rule — A stealth rule is a rule that should be located as early
in your policy as possible, typically immediately after any
Management rules.
Cleanup and Stealth Rules
78
©2020 Check Point Software Technologies Ltd.
Global Properties
The Security Policy includes numerous
settings that are configured as Global
Properties. These settings apply to:
• The Firewall
• VPN
• Reporting Tools
• Check Point Products
• Check Point Services & Functions
79
©2020 Check Point Software Technologies Ltd.
Sections
When managing a large network, it can be helpful to divide the
policy into smaller sections. Use section titles to more easily
navigate between large rule bases.
80
©2020 Check Point Software Technologies Ltd.
Publish Policy
Publishing updates the policy
on the management server
and/or Log Server and
makes the changes visible in
SmartConsole.
81
©2020 Check Point Software Technologies Ltd.
Policy Types
There are four policy types
available for each policy
package:
• Access Control
• QoS
• Desktop Security
• Threat Prevention
82
©2020 Check Point Software Technologies Ltd.
Shared Policies
The Shared Policies
section in a policy
package provides
access to these
granular Software
Blades and features:
• Mobile Access
• Data Loss Prevention
• HTTPS Inspection
• Geo Policy
83
©2020 Check Point Software Technologies Ltd.
Additional Policy Management Tools
Access Control Tools
Include:
• VPN Communities
• Client Certificates
• Application Wiki
• Installation History
84
©2020 Check Point Software Technologies Ltd.
Install Policy
There are two types
of installation modes:
• Installs the policy on
each target gateway
independently.
• Installs the policy
on all target gateways.
85
©2020 Check Point Software Technologies Ltd.
Review Questions
1. Name one thing that a basic rule consists of?
2. What are the building blocks of Security Policy rules?
3. What is the purpose of the UserCheck?
86
©2020 Check Point Software Technologies Ltd.
Lab 5.1- Creating Security Policy – Creating Objects
Site Alpha Site Bravo
Internal
DMZ
EXT
C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y
Internet
Name: A-GW-01
Mgmt Address: 10.1.1.2/24
Int Address: 192.168.11.2/24
Sync Address: 192.168.10.2/24
Ext Address: 203.0.113.2/24
DMZ Address: 192.168.12.2/24
Default GW: 203.0.113.254
SYNC
Name: A-GW-02
Mgmt Address: 10.1.1.3/24
Int Address: 192.168.11.3/24
Sync Address: 192.168.10.3/24
Ext Address: 203.0.113.3/24
DMZ Address: 192.168.12.3/24
Default GW: 203.0.113.254
EXT
NAT
Management
Internal
Name: A-GW-Cluster
Mgmt VIP: 10.1.1.1/24
Int VIP: 192.168.11.1/24
Ext VIP: 203.0.113.1/24
DMZ VIP: 192.168.12.1/24
Name: A-GUI
IP Address: 10.1.1.201/24
Default GW: 10.1.1.1
Name: A-SMS
IP Address: 10.1.1.101/24
Default GW: 10.1.1.1
Name: A-Host
IP Address: 192.168.11.201/24
Default GW: 192.168.11.1
Name: A-LDAP
IP Address: 192.168.11.101/24
Default GW: 192.168.11.1
Name: A-DMZ
IP Address: 192.168.12.101/24
Default GW: 192.168.12.1 Name: B-GW
Mgmt Address: Interface Disabled
Int Address: 192.168.21.1/24
Sync Address: interface Disabled
Ext Address: 203.0.113.100/24
Default GW: 203.0.113.254
Name: B-Host
IP Address: 192.168.21.201/24
Default GW: 192.168.21.1
eth0
eth1
eth2
eth3
eth4
eth3
eth1
Name: Router
IP Address: 203.0.113.254/24
87
©2020 Check Point Software Technologies Ltd.
Performance Objective:
• Create and configure host, network and group objects
Task:
• Create new host, network and group objects
Lab 5.1: Creating Security Policy – Creating Objects
88
©2020 Check Point Software Technologies Ltd.
Lab 5.2- Creating Security Policy – Creating Rules
Site Alpha Site Bravo
Internal
DMZ
EXT
C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y
Internet
Name: A-GW-01
Mgmt Address: 10.1.1.2/24
Int Address: 192.168.11.2/24
Sync Address: 192.168.10.2/24
Ext Address: 203.0.113.2/24
DMZ Address: 192.168.12.2/24
Default GW: 203.0.113.254
SYNC
Name: A-GW-02
Mgmt Address: 10.1.1.3/24
Int Address: 192.168.11.3/24
Sync Address: 192.168.10.3/24
Ext Address: 203.0.113.3/24
DMZ Address: 192.168.12.3/24
Default GW: 203.0.113.254
EXT
NAT
Management
Internal
Name: A-GW-Cluster
Mgmt VIP: 10.1.1.1/24
Int VIP: 192.168.11.1/24
Ext VIP: 203.0.113.1/24
DMZ VIP: 192.168.12.1/24
Name: A-GUI
IP Address: 10.1.1.201/24
Default GW: 10.1.1.1
Name: A-SMS
IP Address: 10.1.1.101/24
Default GW: 10.1.1.1
Name: A-Host
IP Address: 192.168.11.201/24
Default GW: 192.168.11.1
Name: A-LDAP
IP Address: 192.168.11.101/24
Default GW: 192.168.11.1
Name: A-DMZ
IP Address: 192.168.12.101/24
Default GW: 192.168.12.1 Name: B-GW
Mgmt Address: Interface Disabled
Int Address: 192.168.21.1/24
Sync Address: interface Disabled
Ext Address: 203.0.113.100/24
Default GW: 203.0.113.254
Name: B-Host
IP Address: 192.168.21.201/24
Default GW: 192.168.21.1
eth0
eth1
eth2
eth3
eth4
eth3
eth1
Name: Router
IP Address: 203.0.113.254/24
89
©2020 Check Point Software Technologies Ltd.
Performance Objective:
• Use SmartConsole to create the network policy
Tasks:
• Create rules using the objects created in previous lab
• Create Check Point recommended rules
Lab 5.2: Creating Security Policy – Creating Rules
90
©2020 Check Point Software Technologies Ltd.
Lab 5.3 – Monitoring Policy Status
Site Alpha Site Bravo
Internal
DMZ
EXT
C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y
Internet
Name: A-GW-01
Mgmt Address: 10.1.1.2/24
Int Address: 192.168.11.2/24
Sync Address: 192.168.10.2/24
Ext Address: 203.0.113.2/24
DMZ Address: 192.168.12.2/24
Default GW: 203.0.113.254
SYNC
Name: A-GW-02
Mgmt Address: 10.1.1.3/24
Int Address: 192.168.11.3/24
Sync Address: 192.168.10.3/24
Ext Address: 203.0.113.3/24
DMZ Address: 192.168.12.3/24
Default GW: 203.0.113.254
EXT
NAT
Management
Internal
Name: A-GW-Cluster
Mgmt VIP: 10.1.1.1/24
Int VIP: 192.168.11.1/24
Ext VIP: 203.0.113.1/24
DMZ VIP: 192.168.12.1/24
Name: A-GUI
IP Address: 10.1.1.201/24
Default GW: 10.1.1.1
Name: A-SMS
IP Address: 10.1.1.101/24
Default GW: 10.1.1.1
Name: A-Host
IP Address: 192.168.11.201/24
Default GW: 192.168.11.1
Name: A-LDAP
IP Address: 192.168.11.101/24
Default GW: 192.168.11.1
Name: A-DMZ
IP Address: 192.168.12.101/24
Default GW: 192.168.12.1 Name: B-GW
Mgmt Address: Interface Disabled
Int Address: 192.168.21.1/24
Sync Address: interface Disabled
Ext Address: 203.0.113.100/24
Default GW: 203.0.113.254
Name: B-Host
IP Address: 192.168.21.201/24
Default GW: 192.168.21.1
eth0
eth1
eth2
eth3
eth4
eth3
eth1
Name: Router
IP Address: 203.0.113.254/24
91
©2020 Check Point Software Technologies Ltd.
Performance Objectives:
• Install the Security Policy
• Monitor and review the status
Tasks:
• Install policy
• Monitor and review the policy install status
• Review an Audit log for the policy install
Lab 5.3: Monitoring Policy Status
92
©2020 Check Point Software Technologies Ltd.
POLICY LAYERS
Chapter Six
93
©2020 Check Point Software Technologies Ltd.
• Understand the Check Point policy
layer concept.
• Understand how policy layers
affect traffic inspection.
• Understand how to enable the
Application Control and URL
Filtering software blades to block
access to various applications.
Learning
Objectives
94
©2020 Check Point Software Technologies Ltd.
Policy Layer Concept
When working with Policy Layers,
the Manage Layers window is
used. To open the Manage
Layers window, select Menu >
Manage Policies and Layers in
SmartConsole.
95
©2020 Check Point Software Technologies Ltd.
Manage Policies and Layers
The window below serves as a dashboard for policies and layers. The specific
columns on the dashboard are identified with a corresponding number and
definition in the list below:
• Layer - Shows the name of the layer
• Number of Rules - Shows the number
• of rules
• Modifier - Shows the last user
• Last Modified - Shows the date and time
• Blades - Shows the Blades
• Used in policies - Specifies the
• policy package
• Mode - Shows ordered or inline layer
96
©2020 Check Point Software Technologies Ltd.
Manage Policies and Layers
When possible, it is a best
practice to share policy
layers with other policy
packages. To enable this,
check the “Multiple policies
and rules can use this
layer” checkbox.
97
©2020 Check Point Software Technologies Ltd.
Review Questions
1. How does a Rule Base work with a Security Policy?
2. Which blades can be enabled on a layer?
3. What are the two layer options?
98
©2020 Check Point Software Technologies Ltd.
Lab 6.1 – Ordered Layers
Site Alpha Site Bravo
Internal
DMZ
EXT
C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y
Internet
Name: A-GW-01
Mgmt Address: 10.1.1.2/24
Int Address: 192.168.11.2/24
Sync Address: 192.168.10.2/24
Ext Address: 203.0.113.2/24
DMZ Address: 192.168.12.2/24
Default GW: 203.0.113.254
SYNC
Name: A-GW-02
Mgmt Address: 10.1.1.3/24
Int Address: 192.168.11.3/24
Sync Address: 192.168.10.3/24
Ext Address: 203.0.113.3/24
DMZ Address: 192.168.12.3/24
Default GW: 203.0.113.254
EXT
NAT
Management
Internal
Name: A-GW-Cluster
Mgmt VIP: 10.1.1.1/24
Int VIP: 192.168.11.1/24
Ext VIP: 203.0.113.1/24
DMZ VIP: 192.168.12.1/24
Name: A-GUI
IP Address: 10.1.1.201/24
Default GW: 10.1.1.1
Name: A-SMS
IP Address: 10.1.1.101/24
Default GW: 10.1.1.1
Name: A-Host
IP Address: 192.168.11.201/24
Default GW: 192.168.11.1
Name: A-LDAP
IP Address: 192.168.11.101/24
Default GW: 192.168.11.1
Name: A-DMZ
IP Address: 192.168.12.101/24
Default GW: 192.168.12.1 Name: B-GW
Mgmt Address: Interface Disabled
Int Address: 192.168.21.1/24
Sync Address: interface Disabled
Ext Address: 203.0.113.100/24
Default GW: 203.0.113.254
Name: B-Host
IP Address: 192.168.21.201/24
Default GW: 192.168.21.1
eth0
eth1
eth2
eth3
eth4
eth3
eth1
Name: Router
IP Address: 203.0.113.254/24
99
©2020 Check Point Software Technologies Ltd.
Performance Objectives:
• Demonstrate how to share a layer between Security Policies
Tasks:
• Add a Data Awareness layer to the Standard policy
• Configure the Application Control and URL Filtering Rule Base
• Share the new Data Awareness layer
Lab 6.1: Ordered Layers
100
©2020 Check Point Software Technologies Ltd.
Lab 6.2 – Inline Layers
Site Alpha Site Bravo
Internal
DMZ
EXT
C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y
Internet
Name: A-GW-01
Mgmt Address: 10.1.1.2/24
Int Address: 192.168.11.2/24
Sync Address: 192.168.10.2/24
Ext Address: 203.0.113.2/24
DMZ Address: 192.168.12.2/24
Default GW: 203.0.113.254
SYNC
Name: A-GW-02
Mgmt Address: 10.1.1.3/24
Int Address: 192.168.11.3/24
Sync Address: 192.168.10.3/24
Ext Address: 203.0.113.3/24
DMZ Address: 192.168.12.3/24
Default GW: 203.0.113.254
EXT
NAT
Management
Internal
Name: A-GW-Cluster
Mgmt VIP: 10.1.1.1/24
Int VIP: 192.168.11.1/24
Ext VIP: 203.0.113.1/24
DMZ VIP: 192.168.12.1/24
Name: A-GUI
IP Address: 10.1.1.201/24
Default GW: 10.1.1.1
Name: A-SMS
IP Address: 10.1.1.101/24
Default GW: 10.1.1.1
Name: A-Host
IP Address: 192.168.11.201/24
Default GW: 192.168.11.1
Name: A-LDAP
IP Address: 192.168.11.101/24
Default GW: 192.168.11.1
Name: A-DMZ
IP Address: 192.168.12.101/24
Default GW: 192.168.12.1 Name: B-GW
Mgmt Address: Interface Disabled
Int Address: 192.168.21.1/24
Sync Address: interface Disabled
Ext Address: 203.0.113.100/24
Default GW: 203.0.113.254
Name: B-Host
IP Address: 192.168.21.201/24
Default GW: 192.168.21.1
eth0
eth1
eth2
eth3
eth4
eth3
eth1
Name: Router
IP Address: 203.0.113.254/24
101
©2020 Check Point Software Technologies Ltd.
Performance Objectives:
• Demonstrate how to create an inline layer and share this layer
between policies
Task:
• Create an Inline layer
Lab 6.2: Inline Layers
102
©2020 Check Point Software Technologies Ltd.
MANAGING USER ACCESS
Chapter Seven
103
©2020 Check Point Software Technologies Ltd.
• Recognize how to define users and
user groups.
• Understand how to manage user
access for internal and external
users.
• Describe Identity Awareness
components and configurations.
Learning
Objectives
104
©2020 Check Point Software Technologies Ltd.
Overview of User Management Components
• Services allowed
• Locations allowed to access
network
• Allowed network
destinations
• Time frame to connect
• Time frame to access
network
• Authentication process
• Working remotely process
Users are created for use as network objects in Security Policies and
to define the different terms under which users can operate, such as:
105
©2020 Check Point Software Technologies Ltd.
User Directory
• Leverages LDAP Servers to obtain identification
• Eliminates Risk of manual maintaining & synchronizing data
• Enables centralized user management
• Query user information, CRL retrieval, authenticate users
• Recommended with large user count
• requires a special license- included in Mobile access Blade
106
©2020 Check Point Software Technologies Ltd.
Identity Awareness
• Network location
• The identity of a user
• The identity of a machine
Identity Awareness lets you
easily configure network
access and auditing based on
one or more of the following
items:
107
©2020 Check Point Software Technologies Ltd.
Active Directory (AD) Query
The Active Directory Query is a clientless identity acquisition method that allows the
Security Gateway to seamlessly identify Active Directory users and computers.
108
©2020 Check Point Software Technologies Ltd.
Captive Portal for Guest Access
When users try to access a
resource, they are directed
to a web page requiring
them to enter login
credentials for verification.
109
©2020 Check Point Software Technologies Ltd.
Adding a User from LDAP
Managing users internally
differs when incorporating
LDAP:
• User management in User
Directory is handled externally
and not locally.
• User Directory server
templates, unlike internal user
templates, can be modified
and applied to users
dynamically.
110
©2020 Check Point Software Technologies Ltd.
Access Roles
Access roles are objects
that allow you to configure
network access according
to:
• Networks
• User and user groups
• Computers and computer
groups
• Remote access clients
111
©2020 Check Point Software Technologies Ltd.
Access Policy Rules
After Identity Awareness has been activated, you can create access
role objects and use them in the Source and Destination columns of
Access Control policy rules.
112
©2020 Check Point Software Technologies Ltd.
Rule Base
Using Identity Awareness, you can define a policy rule for specified
users who send traffic from specified computers or from any
computer. The following is an example of a rule that redirects the
user to the Captive Portal.
113
©2020 Check Point Software Technologies Ltd.
Review Questions
1. What purpose does the User Directory serve?
2. Name one of the items the Identity Awareness lets you configure network
access and auditing based on?
3. Name one authentication scheme that Check Point supports:
114
©2020 Check Point Software Technologies Ltd.
Lab 7.1 – Provide User Access
Site Alpha Site Bravo
Internal
DMZ
EXT
C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y
Internet
Name: A-GW-01
Mgmt Address: 10.1.1.2/24
Int Address: 192.168.11.2/24
Sync Address: 192.168.10.2/24
Ext Address: 203.0.113.2/24
DMZ Address: 192.168.12.2/24
Default GW: 203.0.113.254
SYNC
Name: A-GW-02
Mgmt Address: 10.1.1.3/24
Int Address: 192.168.11.3/24
Sync Address: 192.168.10.3/24
Ext Address: 203.0.113.3/24
DMZ Address: 192.168.12.3/24
Default GW: 203.0.113.254
EXT
NAT
Management
Internal
Name: A-GW-Cluster
Mgmt VIP: 10.1.1.1/24
Int VIP: 192.168.11.1/24
Ext VIP: 203.0.113.1/24
DMZ VIP: 192.168.12.1/24
Name: A-GUI
IP Address: 10.1.1.201/24
Default GW: 10.1.1.1
Name: A-SMS
IP Address: 10.1.1.101/24
Default GW: 10.1.1.1
Name: A-Host
IP Address: 192.168.11.201/24
Default GW: 192.168.11.1
Name: A-LDAP
IP Address: 192.168.11.101/24
Default GW: 192.168.11.1
Name: A-DMZ
IP Address: 192.168.12.101/24
Default GW: 192.168.12.1 Name: B-GW
Mgmt Address: Interface Disabled
Int Address: 192.168.21.1/24
Sync Address: interface Disabled
Ext Address: 203.0.113.100/24
Default GW: 203.0.113.254
Name: B-Host
IP Address: 192.168.21.201/24
Default GW: 192.168.21.1
eth0
eth1
eth2
eth3
eth4
eth3
eth1
Name: Router
IP Address: 203.0.113.254/24
115
©2020 Check Point Software Technologies Ltd.
Performance Objectives:
• Enable Identity Awareness
• Deploy user access roles for more granular control of the
Security policy
Tasks:
• Configure the Security Policy for Identity Awareness
• Define the user access role
• Test Identity Awareness connection
Lab 7.1: Provide User Access
116
©2020 Check Point Software Technologies Ltd.
WORKING WITH NAT
Chapter Eight
117
©2020 Check Point Software Technologies Ltd.
• Articulate how Network Address
Translation (NAT) affects traffic.
• Describe how to configure manual
and automatic NAT.
Learning
Objectives
118
©2020 Check Point Software Technologies Ltd.
NAT Rules
NAT rules modify the IP address
information associated with traffic
packets as they pass through the
Security Gateway. The expected
behavior of the gateway is based
on the type of NAT rule
configured and how the rule is
applied within the flow of traffic.
NAT can be configured on Check
Point hosts, nodes, networks,
address ranges and dynamic
objects.
119
©2020 Check Point Software Technologies Ltd.
Manual and Automatic NAT
• Automatic NAT
• Configured through the Network Object, the Host Object, and the Address
Range Object
• Supports Hide and Static NAT
• Manual NAT
• Offers more flexibility
• Can allow the translation of both the source and destination of the packet
• Supports Hide and Static NAT
120
©2020 Check Point Software Technologies Ltd.
NAT Configuration
NAT can be configured by
manually creating rules in the
NAT policy or enabling NAT
on the desired network object.
Then the rules are created
automatically.
121
©2020 Check Point Software Technologies Ltd.
Review Questions
1. What is the difference between Hide NAT and Static NAT?
2. What are the three ranges of IP addresses that are designated by RFC
1918 as private and non-routable on the Internet?
122
©2020 Check Point Software Technologies Ltd.
Lab 8.1 – Automatic NAT Configuration
Site Alpha Site Bravo
Internal
DMZ
EXT
C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y
Internet
Name: A-GW-01
Mgmt Address: 10.1.1.2/24
Int Address: 192.168.11.2/24
Sync Address: 192.168.10.2/24
Ext Address: 203.0.113.2/24
DMZ Address: 192.168.12.2/24
Default GW: 203.0.113.254
SYNC
Name: A-GW-02
Mgmt Address: 10.1.1.3/24
Int Address: 192.168.11.3/24
Sync Address: 192.168.10.3/24
Ext Address: 203.0.113.3/24
DMZ Address: 192.168.12.3/24
Default GW: 203.0.113.254
EXT
NAT
Management
Internal
Name: A-GW-Cluster
Mgmt VIP: 10.1.1.1/24
Int VIP: 192.168.11.1/24
Ext VIP: 203.0.113.1/24
DMZ VIP: 192.168.12.1/24
Name: A-GUI
IP Address: 10.1.1.201/24
Default GW: 10.1.1.1
Name: A-SMS
IP Address: 10.1.1.101/24
Default GW: 10.1.1.1
Name: A-Host
IP Address: 192.168.11.201/24
Default GW: 192.168.11.1
Name: A-LDAP
IP Address: 192.168.11.101/24
Default GW: 192.168.11.1
Name: A-DMZ
IP Address: 192.168.12.101/24
Default GW: 192.168.12.1 Name: B-GW
Mgmt Address: Interface Disabled
Int Address: 192.168.21.1/24
Sync Address: interface Disabled
Ext Address: 203.0.113.100/24
Default GW: 203.0.113.254
Name: B-Host
IP Address: 192.168.21.201/24
Default GW: 192.168.21.1
eth0
eth1
eth2
eth3
eth4
eth3
eth1
Name: Router
IP Address: 203.0.113.254/24
123
©2020 Check Point Software Technologies Ltd.
Performance Objectives:
• Configure Network Address Translation for server and network
objects
Tasks:
• Configure Hide NAT on network objects
• Configure Static NAT on the servers
Lab 8.1: Automatic NAT Configuration
124
©2020 Check Point Software Technologies Ltd.
TRAFFIC VISIBILITY
Chapter Nine
125
©2020 Check Point Software Technologies Ltd.
• Identify tools designed to monitor
data, determine threats, and
recognize opportunities for
performance improvements.
• Identify tools designed to respond
quickly and efficiently to changes
in gateways, tunnels, remote
users, traffic flow patterns, and
other security activities.
Learning
Objectives
126
©2020 Check Point Software Technologies Ltd.
Analyzing Logs
Collecting logs helps with analyzing network traffic patterns and meeting
compliance requirements.
127
©2020 Check Point Software Technologies Ltd.
Deploy Logging
The following steps detail
the workflow for deploying
logging:
1. Install one or more
standalone Log Servers.
2. In SmartConsole, enable
logging on the management
server.
3. Configure the Security
Gateways to send logs to the
Log Server.
128
©2020 Check Point Software Technologies Ltd.
SmartConsole Logs View
Using the Logs
View, administrators
can examine audit
logs from
administrator
activities and run
custom queries
using pre-defined
search filters.
129
©2020 Check Point Software Technologies Ltd.
Track Options & Settings
The Track Settings window
displays these two advanced
tracking options if one or
more Application & URL
Filtering, Content Awareness,
or Mobile Access Software
Blades are enabled on the
layer:
• Detailed Log
• Extended Log
130
©2020 Check Point Software Technologies Ltd.
Log Details
• Log details include log
information, policy and
traffic flow details.
• Details can be viewed by
double clicking on the log.
131
©2020 Check Point Software Technologies Ltd.
Custom Queries
• Custom queries can
also be created and
saved for future use.
The Favorites list
stores saved custom
queries.
• Additional folders can
be created to organize
the customized
queries.
132
©2020 Check Point Software Technologies Ltd.
Field Keywords
Use pre-defined
fields, followed by a
colon, as keywords in
filter criteria.
A table displays pre-
defined fields and
keyword aliases that
can be used as
alternatives.
133
©2020 Check Point Software Technologies Ltd.
Review Questions
1. What is the purpose for collecting logs?
2. Name at lease one single search filter when creating log queries?
3. What are Boolean operators?
134
©2020 Check Point Software Technologies Ltd.
Lab 9.1 – Generate and View Traffic
Site Alpha Site Bravo
Internal
DMZ
EXT
C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y
Internet
Name: A-GW-01
Mgmt Address: 10.1.1.2/24
Int Address: 192.168.11.2/24
Sync Address: 192.168.10.2/24
Ext Address: 203.0.113.2/24
DMZ Address: 192.168.12.2/24
Default GW: 203.0.113.254
SYNC
Name: A-GW-02
Mgmt Address: 10.1.1.3/24
Int Address: 192.168.11.3/24
Sync Address: 192.168.10.3/24
Ext Address: 203.0.113.3/24
DMZ Address: 192.168.12.3/24
Default GW: 203.0.113.254
EXT
NAT
Management
Internal
Name: A-GW-Cluster
Mgmt VIP: 10.1.1.1/24
Int VIP: 192.168.11.1/24
Ext VIP: 203.0.113.1/24
DMZ VIP: 192.168.12.1/24
Name: A-GUI
IP Address: 10.1.1.201/24
Default GW: 10.1.1.1
Name: A-SMS
IP Address: 10.1.1.101/24
Default GW: 10.1.1.1
Name: A-Host
IP Address: 192.168.11.201/24
Default GW: 192.168.11.1
Name: A-LDAP
IP Address: 192.168.11.101/24
Default GW: 192.168.11.1
Name: A-DMZ
IP Address: 192.168.12.101/24
Default GW: 192.168.12.1 Name: B-GW
Mgmt Address: Interface Disabled
Int Address: 192.168.21.1/24
Sync Address: interface Disabled
Ext Address: 203.0.113.100/24
Default GW: 203.0.113.254
Name: B-Host
IP Address: 192.168.21.201/24
Default GW: 192.168.21.1
eth0
eth1
eth2
eth3
eth4
eth3
eth1
Name: Router
IP Address: 203.0.113.254/24
135
©2020 Check Point Software Technologies Ltd.
Performance Objective:
• Generate network traffic and use traffic visibility tools to
monitor the data
Task:
• View live logs and perform searches to gather historic data
Lab 9.1: Generate and View Traffic
136
©2020 Check Point Software Technologies Ltd.
MONITORING SYSTEM STATES
Chapter Ten
137
©2020 Check Point Software Technologies Ltd.
• Articulate how Security Management Servers
and Security Gateways work together to
monitor the state of the Security Enforcement
System
Learning
Objectives
138
©2020 Check Point Software Technologies Ltd.
Monitor Gateway Status
To see gateway status
in SmartConsole, in
the Gateways &
Servers tab, select a
gateway, right click,
and select Monitor.
139
©2020 Check Point Software Technologies Ltd.
Users View
• Open Sessions
• Overlapping Sessions
• Route Traffic
• Connection Time
• And More
The Users view of SmartView Monitor shows users that have a current VPN
connection to the Security Gateways. It displays the following:
140
©2020 Check Point Software Technologies Ltd.
System Counters View
The System
Counters View
in SmartConsole
shows collected
information on
the status and
activities of
Check Point
products.
141
©2020 Check Point Software Technologies Ltd.
Tunnels View
• The SmartView Monitor
Tunnels view shows the
status of gateway-to-
gateway VPN tunnels.
• Use this view to identify
VPN tunnel malfunctions
and connectivity
problems.
142
©2020 Check Point Software Technologies Ltd.
Traffic View
SmartConsole
Traffic Monitoring
provides in-depth
details on network
traffic and activity.
143
©2020 Check Point Software Technologies Ltd.
Review Questions
1. The monitoring views of SmartConsole and SmartView Monitor show real-time and
historical graphical views of:
2. What does SAM stand for and what does it monitor?
3. Where can alerts be seen?
144
©2020 Check Point Software Technologies Ltd.
Lab 10.1 – Automatic NAT Configuration
Site Alpha Site Bravo
Internal
DMZ
EXT
C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y
Internet
Name: A-GW-01
Mgmt Address: 10.1.1.2/24
Int Address: 192.168.11.2/24
Sync Address: 192.168.10.2/24
Ext Address: 203.0.113.2/24
DMZ Address: 192.168.12.2/24
Default GW: 203.0.113.254
SYNC
Name: A-GW-02
Mgmt Address: 10.1.1.3/24
Int Address: 192.168.11.3/24
Sync Address: 192.168.10.3/24
Ext Address: 203.0.113.3/24
DMZ Address: 192.168.12.3/24
Default GW: 203.0.113.254
EXT
NAT
Management
Internal
Name: A-GW-Cluster
Mgmt VIP: 10.1.1.1/24
Int VIP: 192.168.11.1/24
Ext VIP: 203.0.113.1/24
DMZ VIP: 192.168.12.1/24
Name: A-GUI
IP Address: 10.1.1.201/24
Default GW: 10.1.1.1
Name: A-SMS
IP Address: 10.1.1.101/24
Default GW: 10.1.1.1
Name: A-Host
IP Address: 192.168.11.201/24
Default GW: 192.168.11.1
Name: A-LDAP
IP Address: 192.168.11.101/24
Default GW: 192.168.11.1
Name: A-DMZ
IP Address: 192.168.12.101/24
Default GW: 192.168.12.1 Name: B-GW
Mgmt Address: Interface Disabled
Int Address: 192.168.21.1/24
Sync Address: interface Disabled
Ext Address: 203.0.113.100/24
Default GW: 203.0.113.254
Name: B-Host
IP Address: 192.168.21.201/24
Default GW: 192.168.21.1
eth0
eth1
eth2
eth3
eth4
eth3
eth1
Name: Router
IP Address: 203.0.113.254/24
145
©2020 Check Point Software Technologies Ltd.
Performance Objective:
• Use SmartView Monitor to view status, alerts and block suspicious
traffic
Tasks:
• Monitor status of the systems
• Configure alerts
• Configure Suspicious Activity Rules
Lab 10.1: Monitoring System States
146
©2020 Check Point Software Technologies Ltd.
SECURITY EVENTS
Chapter 11
147
©2020 Check Point Software Technologies Ltd.
• Understand how SmartEvent
functions to identify critical
security issues.
• Identify SmartEvent components
used to store network activity logs
and identify events.
• Explain how SmartEvent
eliminates security threats
targeting organizations.
• Understand how SmartEvent can
assist in reporting security threats
targeting organizations.
Learning
Objectives
148
©2020 Check Point Software Technologies Ltd.
Threat Detection
Increasingly, Security Administrators have to know how to prevent,
detect and mitigate a range of sophisticated cyber security attacks.
Check Point’s SmartEvent Software Blade identifies critical security
events such as intrusion, Bot incidents, and potential data loss before
they occur.
149
©2020 Check Point Software Technologies Ltd.
The SmartEvent Solution
SmartEvent correlates logs
and detects real security
threats. SmartEvent is a
licensed Software Blade
and can be installed on a
single server or across
multiple correlation units to
reduce the network load.
150
©2020 Check Point Software Technologies Ltd.
SmartEvent Management
To enable SmartEvent on the
Security Management Server,
take the following steps:
• Open SmartConsole.
• Open the Security Management
Server network object.
• On the Management tab, enable
Software Blades.
• In the SmartConsole main
toolbar, click Publish.
151
©2020 Check Point Software Technologies Ltd.
Event Analysis
SmartConsole, SmartView
Web Application, and the
SmartEvent GUI client
consolidate billions of logs
and show them as prioritized
security events so you can
immediately respond to
security incidents, and do the
necessary actions to prevent
more attacks.
152
©2020 Check Point Software Technologies Ltd.
Reporting Security Events
Pre-defined and
customized reports
can be generated to
provide security
information on a
schedule (daily,
weekly, or monthly),
or as needed.
153
©2020 Check Point Software Technologies Ltd.
Using Pre-Defined Reports
To open
the catalog of
predefined and
customized
reports, click
the [+] tab.
154
©2020 Check Point Software Technologies Ltd.
Security CheckUp
With Check Point Security Checkup tools, administrators can
generate a comprehensive security analysis report that summarizes:
• Security Events
• Security Risks
• Remediation
155
©2020 Check Point Software Technologies Ltd.
Lab 11.1 – Automatic NAT Configuration
Site Alpha Site Bravo
Internal
DMZ
EXT
C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y
Internet
Name: A-GW-01
Mgmt Address: 10.1.1.2/24
Int Address: 192.168.11.2/24
Sync Address: 192.168.10.2/24
Ext Address: 203.0.113.2/24
DMZ Address: 192.168.12.2/24
Default GW: 203.0.113.254
SYNC
Name: A-GW-02
Mgmt Address: 10.1.1.3/24
Int Address: 192.168.11.3/24
Sync Address: 192.168.10.3/24
Ext Address: 203.0.113.3/24
DMZ Address: 192.168.12.3/24
Default GW: 203.0.113.254
EXT
NAT
Management
Internal
Name: A-GW-Cluster
Mgmt VIP: 10.1.1.1/24
Int VIP: 192.168.11.1/24
Ext VIP: 203.0.113.1/24
DMZ VIP: 192.168.12.1/24
Name: A-GUI
IP Address: 10.1.1.201/24
Default GW: 10.1.1.1
Name: A-SMS
IP Address: 10.1.1.101/24
Default GW: 10.1.1.1
Name: A-Host
IP Address: 192.168.11.201/24
Default GW: 192.168.11.1
Name: A-LDAP
IP Address: 192.168.11.101/24
Default GW: 192.168.11.1
Name: A-DMZ
IP Address: 192.168.12.101/24
Default GW: 192.168.12.1 Name: B-GW
Mgmt Address: Interface Disabled
Int Address: 192.168.21.1/24
Sync Address: interface Disabled
Ext Address: 203.0.113.100/24
Default GW: 203.0.113.254
Name: B-Host
IP Address: 192.168.21.201/24
Default GW: 192.168.21.1
eth0
eth1
eth2
eth3
eth4
eth3
eth1
Name: Router
IP Address: 203.0.113.254/24
156
©2020 Check Point Software Technologies Ltd.
Review Questions
1. What is a Certificate Sharing Event?
2. Name one component in the SmartEvent architecture?
3. Why does the SmartEvent Server communicate with the Security Management Server?
157
©2020 Check Point Software Technologies Ltd.
Performance Objectives:
• Configure a SmartEvent Server to monitor relevant patterns
and events.
• Demonstrate how to configure event Alerts in SmartEvent.
• Demonstrate how to run specific SmartEvent reports.
Tasks:
• Configure the SmartEvent Suite.
• Generate Reports based on available data.
Lab 11.1: Evaluating Threats with SmartEvent
158
©2020 Check Point Software Technologies Ltd.
BASIC CONCEPTS OF VPN
Chapter Twelve
159
©2020 Check Point Software Technologies Ltd.
• Understand Site-to-Site and
Remote Access VPN deployments
and communities.
• Understand how to analyze and
interpret VPN tunnel traffic.
Learning
Objectives
160
©2020 Check Point Software Technologies Ltd.
VPN Components
• VPN Domain
• VPN Gateway
• VPN Community
• VPN Trust Entities
• VPN Management Tools
The following components are used to construct VPN communication
in the network:
161
©2020 Check Point Software Technologies Ltd.
Site-to-Site VPN Deployment
Handles secure communication between offices that are connected by
the Internet.
162
©2020 Check Point Software Technologies Ltd.
Remote Access VPN Deployment
A Remote Access VPN deployment handles secure communication
between internal corporate resources and remote users using VPN
tunnels.
163
©2020 Check Point Software Technologies Ltd.
VPN Communities
When configuring a
VPN gateway in
SmartConsole, decide
which IP address
objects are included in
the VPN domain. The
System Administrators
combine multiple VPN
domains into a VPN
community.
164
©2020 Check Point Software Technologies Ltd.
Meshed VPN Community
A Meshed VPN community
consists of VPN gateways that
create VPN tunnels with all the
other VPN gateways in the
community.
165
©2020 Check Point Software Technologies Ltd.
Star VPN Community
A Star VPN community can be
used when a company must share
information with external partners
or companies.
166
©2020 Check Point Software Technologies Ltd.
VPN Routing
VPN Routing is a way of
directing communication
through a specific tunnel
in order to enhance
existing connectivity or
security.
167
©2020 Check Point Software Technologies Ltd.
Combination VPN Communities
Combination VPN Communities are more complex VPN deployment
scenarios. A combination VPN community can be defined by using for
example, two Star VPN communities and one Meshed VPN
community.
168
©2020 Check Point Software Technologies Ltd.
Access Control for VPN Connections
Configure rules in the Access Control policy to allow the connections
between the VPN gateways. The VPN column in the Access Control
policy is used to configure how VPN connections are matched to
the rules.
169
©2020 Check Point Software Technologies Ltd.
Access Control for VPN Connections
Allow All Connections
Allow All Site-to-Site VPN Connections
Allow Specific VPN Communities
170
©2020 Check Point Software Technologies Ltd.
Site-to-Site Communities — Allow All Encrypted Traffic
Configure a Site-to-Site VPN
community to automatically
allow all encrypted
connections. Use the Accept
all encrypted traffic option to
configure the Firewall to
allow all VPN traffic to the
internal networks for the
VPN communities.
171
©2020 Check Point Software Technologies Ltd.
Permanent Tunnels can only be
established between Check Point VPN
gateways. Permanent VPN Tunnels can
be set on the following:
• On all tunnels in the community
• On all tunnels for specific gateways
• On specific tunnels in the community
Permanent VPN Tunnels
172
©2020 Check Point Software Technologies Ltd.
The SmartView Monitor
GUI displays the status of
the VPN tunnels in the
network.
Monitoring VPN Tunnels
173
©2020 Check Point Software Technologies Ltd.
Review Questions
1. How does a VPN provide privacy and security?
2. Why are Permanent VPN tunnels constantly kept active?
3. What is Tunnel Testing?
174
©2020 Check Point Software Technologies Ltd.
Lab 12.1 – Basic VPN Establishment
Site Alpha Site Bravo
Internal
DMZ
EXT
C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y
Internet
Name: A-GW-01
Mgmt Address: 10.1.1.2/24
Int Address: 192.168.11.2/24
Sync Address: 192.168.10.2/24
Ext Address: 203.0.113.2/24
DMZ Address: 192.168.12.2/24
Default GW: 203.0.113.254
SYNC
Name: A-GW-02
Mgmt Address: 10.1.1.3/24
Int Address: 192.168.11.3/24
Sync Address: 192.168.10.3/24
Ext Address: 203.0.113.3/24
DMZ Address: 192.168.12.3/24
Default GW: 203.0.113.254
EXT
NAT
Management
Internal
Name: A-GW-Cluster
Mgmt VIP: 10.1.1.1/24
Int VIP: 192.168.11.1/24
Ext VIP: 203.0.113.1/24
DMZ VIP: 192.168.12.1/24
Name: A-GUI
IP Address: 10.1.1.201/24
Default GW: 10.1.1.1
Name: A-SMS
IP Address: 10.1.1.101/24
Default GW: 10.1.1.1
Name: A-Host
IP Address: 192.168.11.201/24
Default GW: 192.168.11.1
Name: A-LDAP
IP Address: 192.168.11.101/24
Default GW: 192.168.11.1
Name: A-DMZ
IP Address: 192.168.12.101/24
Default GW: 192.168.12.1 Name: B-GW
Mgmt Address: Interface Disabled
Int Address: 192.168.21.1/24
Sync Address: interface Disabled
Ext Address: 203.0.113.100/24
Default GW: 203.0.113.254
Name: B-Host
IP Address: 192.168.21.201/24
Default GW: 192.168.21.1
eth0
eth1
eth2
eth3
eth4
eth3
eth1
Name: Router
IP Address: 203.0.113.254/24
175
©2020 Check Point Software Technologies Ltd.
Performance Objectives:
• Configure and deploy a site-to-site VPN
• Test the VPN connection and analyze the tunnel traffic
Tasks:
• Define the VPN domain
• Define the VPN community
• Create the VPN rule and modify the Rule Base
• Test the VPN connection
Lab 12.1: Basic VPN Establishment
176
©2020 Check Point Software Technologies Ltd.
WORKING WITH CLUSTERXL
Chapter Thirteen
177
©2020 Check Point Software Technologies Ltd.
• Understand the basic concepts of
ClusterXL technology and its
advantages.
Learning
Objectives
178
©2020 Check Point Software Technologies Ltd.
Overview of ClusterXL
• Provides Security Gateway redundancy and load sharing.
• Uses State Synchronization to keep active connections
alive and prevent data loss when a member fails.
• Two or more Security Gateways configured to act as one
unit.
179
©2020 Check Point Software Technologies Ltd.
ClusterXL Topology
ClusterXL uses unique physical IP
and MAC addresses for the cluster
members and virtual IP addresses
to represent the cluster itself.
Each cluster member has at least
three interfaces:
• One External Interface
• One Internal Interface
• One for Synchronization
180
©2020 Check Point Software Technologies Ltd.
Configuring Member Priority
Gateway cluster members are
listed in SmartConsole by
priority. The highest priority
member is the active cluster
member by default.
181
©2020 Check Point Software Technologies Ltd.
There are two High Availability
modes available: ClusterXL and
VRRP. ClusterXL High Availability
mode designates one of the cluster
members as the Active machine,
while the rest of the members are in
a Standby mode.
Configuring High Availability
182
©2020 Check Point Software Technologies Ltd.
Use SmartView Monitor to
stop ClusterXL on a Security
Gateway and cause a failover.
In SmartView Monitor, right-
click the cluster member, and
select Cluster Member > Stop
Member.
Perform Manual Failover
183
©2020 Check Point Software Technologies Ltd.
Monitoring a Cluster
In order to ensure that
clusters and cluster
members are operating
correctly, the
cphaprob state
command from the
CLI is used to monitor
cluster members and
critical devices.
184
©2020 Check Point Software Technologies Ltd.
Review Questions
1. What is the Cluster Control Protocol (CCP)?
2. Which command is used to monitor cluster members ?
3. Describe a situation that causes a failover to take place on the active
cluster member?
185
©2020 Check Point Software Technologies Ltd.
Lab 13.1 – Working with ClusterXL
Site Alpha Site Bravo
Internal
DMZ
EXT
C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y
Internet
Name: A-GW-01
Mgmt Address: 10.1.1.2/24
Int Address: 192.168.11.2/24
Sync Address: 192.168.10.2/24
Ext Address: 203.0.113.2/24
DMZ Address: 192.168.12.2/24
Default GW: 203.0.113.254
SYNC
Name: A-GW-02
Mgmt Address: 10.1.1.3/24
Int Address: 192.168.11.3/24
Sync Address: 192.168.10.3/24
Ext Address: 203.0.113.3/24
DMZ Address: 192.168.12.3/24
Default GW: 203.0.113.254
EXT
NAT
Management
Internal
Name: A-GW-Cluster
Mgmt VIP: 10.1.1.1/24
Int VIP: 192.168.11.1/24
Ext VIP: 203.0.113.1/24
DMZ VIP: 192.168.12.1/24
Name: A-GUI
IP Address: 10.1.1.201/24
Default GW: 10.1.1.1
Name: A-SMS
IP Address: 10.1.1.101/24
Default GW: 10.1.1.1
Name: A-Host
IP Address: 192.168.11.201/24
Default GW: 192.168.11.1
Name: A-LDAP
IP Address: 192.168.11.101/24
Default GW: 192.168.11.1
Name: A-DMZ
IP Address: 192.168.12.101/24
Default GW: 192.168.12.1 Name: B-GW
Mgmt Address: Interface Disabled
Int Address: 192.168.21.1/24
Sync Address: interface Disabled
Ext Address: 203.0.113.100/24
Default GW: 203.0.113.254
Name: B-Host
IP Address: 192.168.21.201/24
Default GW: 192.168.21.1
eth0
eth1
eth2
eth3
eth4
eth3
eth1
Name: Router
IP Address: 203.0.113.254/24
186
©2020 Check Point Software Technologies Ltd.
Performance Objective:
• Test ClusterXL High Availability
Tasks:
• Review High Availability settings
• Test High Availability
Lab 13.1: Working with ClusterXL
187
©2020 Check Point Software Technologies Ltd.
COMPLIANCE TASKS
Chapter Fourteen
188
©2020 Check Point Software Technologies Ltd.
• Knowledge about how to perform
periodic administrator tasks.
• Introduction to the Compliance
Software Blade.
• Understand how to use CPView to
gather basic gateway status
information.
Learning
Objectives
189
©2020 Check Point Software Technologies Ltd.
Understand how to perform
periodic administrator tasks as
specified in administrator job
descriptions.
Administrator Task
Implementation
190
©2020 Check Point Software Technologies Ltd.
Compliance Software Blade
The Compliance Software Blade is used to continuously scan the
Security Policy and configuration settings defined within the following:
• Check Point Software Blades
• Security Gateways
• Security Management Server
191
©2020 Check Point Software Technologies Ltd.
Best Practices
The Compliance Software
Blade compares policy and
configuration changes
against best practices
before any changes are
installed.
192
©2020 Check Point Software Technologies Ltd.
Compliance Best Practice Test
A best practice test details compliance
status and recommends corrective
action. There are two types of tests -
Global and Object-Based.
• Global tests examine configuration
settings for the entire organization.
• Object-Based tests examine the
configuration settings for particular
objects, such as gateways and
profiles.
193
©2020 Check Point Software Technologies Ltd.
Alerts & Actions
When a best practice
test detects a
degradation to the
compliance status,
such as when a rule
is changed, an alert is
displayed with details
of the issue devices.
194
©2020 Check Point Software Technologies Ltd.
CPView
Use CPView to quickly view general system information
Basic syntax is: cpview [-c <file>] [history {on | off | stat}] [-t]
195
©2020 Check Point Software Technologies Ltd.
Overview View
The Overview view is
the main view of
CPView. It displays a
summary of the main
performance
components in the
system, such as
memory and network
bits per second.
196
©2020 Check Point Software Technologies Ltd.
SysInfo
The SysInfo view shows
general information
about the system such
as system uptime,
version, and hardware
information.
197
©2020 Check Point Software Technologies Ltd.
Network View
There are three sub-views
which provides additional
traffic information broken
down by network interface:
• Interfaces
• Top-Protocols
• Top-Connections
198
©2020 Check Point Software Technologies Ltd.
CPU View
The CPU view
displays an overview
of the current status
of each CPU. There
are two subviews:
• Top-Protocols
• Top-Connections
199
©2020 Check Point Software Technologies Ltd.
Software-blades View
The Software-blades
view shows statistics
related to specific
blades, including VPN,
IDA (Identity
Awareness), DLP,
Threat Extraction,
and Data Awareness.
200
©2020 Check Point Software Technologies Ltd.
Advanced View
The Advanced View provides detailed utilization and counter statistics for
advanced diagnosis. The main view displays CPU_Profiler information.
Sub-views include:
• Memory
• Network
• SecureXL
• ClusterXL
• CoreXL
• PrioQ
• Streaming
• RAD
• UP
• HTTP-Parser
201
©2020 Check Point Software Technologies Ltd.
Review Questions
1. How are best practice scores determined and displayed?
2. What key is used to save the current CPView page to a file?
202
©2020 Check Point Software Technologies Ltd.
Lab 14.1 – Policy Tuning
Site Alpha Site Bravo
Internal
DMZ
EXT
C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y
Internet
Name: A-GW-01
Mgmt Address: 10.1.1.2/24
Int Address: 192.168.11.2/24
Sync Address: 192.168.10.2/24
Ext Address: 203.0.113.2/24
DMZ Address: 192.168.12.2/24
Default GW: 203.0.113.254
SYNC
Name: A-GW-02
Mgmt Address: 10.1.1.3/24
Int Address: 192.168.11.3/24
Sync Address: 192.168.10.3/24
Ext Address: 203.0.113.3/24
DMZ Address: 192.168.12.3/24
Default GW: 203.0.113.254
EXT
NAT
Management
Internal
Name: A-GW-Cluster
Mgmt VIP: 10.1.1.1/24
Int VIP: 192.168.11.1/24
Ext VIP: 203.0.113.1/24
DMZ VIP: 192.168.12.1/24
Name: A-GUI
IP Address: 10.1.1.201/24
Default GW: 10.1.1.1
Name: A-SMS
IP Address: 10.1.1.101/24
Default GW: 10.1.1.1
Name: A-Host
IP Address: 192.168.11.201/24
Default GW: 192.168.11.1
Name: A-LDAP
IP Address: 192.168.11.101/24
Default GW: 192.168.11.1
Name: A-DMZ
IP Address: 192.168.12.101/24
Default GW: 192.168.12.1 Name: B-GW
Mgmt Address: Interface Disabled
Int Address: 192.168.21.1/24
Sync Address: interface Disabled
Ext Address: 203.0.113.100/24
Default GW: 203.0.113.254
Name: B-Host
IP Address: 192.168.21.201/24
Default GW: 192.168.21.1
eth0
eth1
eth2
eth3
eth4
eth3
eth1
Name: Router
IP Address: 203.0.113.254/24
203
©2020 Check Point Software Technologies Ltd.
Performance Objective:
• Enable the compliance software blade
Task:
• Activate the compliance software blade
Lab 14.1: Policy Tuning
204
©2020 Check Point Software Technologies Ltd.
Lab 14.2 – CPView
Site Alpha Site Bravo
Internal
DMZ
EXT
C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y
Internet
Name: A-GW-01
Mgmt Address: 10.1.1.2/24
Int Address: 192.168.11.2/24
Sync Address: 192.168.10.2/24
Ext Address: 203.0.113.2/24
DMZ Address: 192.168.12.2/24
Default GW: 203.0.113.254
SYNC
Name: A-GW-02
Mgmt Address: 10.1.1.3/24
Int Address: 192.168.11.3/24
Sync Address: 192.168.10.3/24
Ext Address: 203.0.113.3/24
DMZ Address: 192.168.12.3/24
Default GW: 203.0.113.254
EXT
NAT
Management
Internal
Name: A-GW-Cluster
Mgmt VIP: 10.1.1.1/24
Int VIP: 192.168.11.1/24
Ext VIP: 203.0.113.1/24
DMZ VIP: 192.168.12.1/24
Name: A-GUI
IP Address: 10.1.1.201/24
Default GW: 10.1.1.1
Name: A-SMS
IP Address: 10.1.1.101/24
Default GW: 10.1.1.1
Name: A-Host
IP Address: 192.168.11.201/24
Default GW: 192.168.11.1
Name: A-LDAP
IP Address: 192.168.11.101/24
Default GW: 192.168.11.1
Name: A-DMZ
IP Address: 192.168.12.101/24
Default GW: 192.168.12.1 Name: B-GW
Mgmt Address: Interface Disabled
Int Address: 192.168.21.1/24
Sync Address: interface Disabled
Ext Address: 203.0.113.100/24
Default GW: 203.0.113.254
Name: B-Host
IP Address: 192.168.21.201/24
Default GW: 192.168.21.1
eth0
eth1
eth2
eth3
eth4
eth3
eth1
Name: Router
IP Address: 203.0.113.254/24
205
©2020 Check Point Software Technologies Ltd.
Performance Objectives:
• Perform periodic tasks as specified in administrator job
descriptions
• Understand how to use CPView to gather basic gateway
status information
Tasks:
• Review statistics in CPView
• Change the refresh rate of CPView
• View historical data
• Save CPView statistics to a file
Lab 14.2: CPView
206
©2020 Check Point Software Technologies Ltd.
Lab 14.3 – Backups
Site Alpha Site Bravo
Internal
DMZ
EXT
C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y
Internet
Name: A-GW-01
Mgmt Address: 10.1.1.2/24
Int Address: 192.168.11.2/24
Sync Address: 192.168.10.2/24
Ext Address: 203.0.113.2/24
DMZ Address: 192.168.12.2/24
Default GW: 203.0.113.254
SYNC
Name: A-GW-02
Mgmt Address: 10.1.1.3/24
Int Address: 192.168.11.3/24
Sync Address: 192.168.10.3/24
Ext Address: 203.0.113.3/24
DMZ Address: 192.168.12.3/24
Default GW: 203.0.113.254
EXT
NAT
Management
Internal
Name: A-GW-Cluster
Mgmt VIP: 10.1.1.1/24
Int VIP: 192.168.11.1/24
Ext VIP: 203.0.113.1/24
DMZ VIP: 192.168.12.1/24
Name: A-GUI
IP Address: 10.1.1.201/24
Default GW: 10.1.1.1
Name: A-SMS
IP Address: 10.1.1.101/24
Default GW: 10.1.1.1
Name: A-Host
IP Address: 192.168.11.201/24
Default GW: 192.168.11.1
Name: A-LDAP
IP Address: 192.168.11.101/24
Default GW: 192.168.11.1
Name: A-DMZ
IP Address: 192.168.12.101/24
Default GW: 192.168.12.1 Name: B-GW
Mgmt Address: Interface Disabled
Int Address: 192.168.21.1/24
Sync Address: interface Disabled
Ext Address: 203.0.113.100/24
Default GW: 203.0.113.254
Name: B-Host
IP Address: 192.168.21.201/24
Default GW: 192.168.21.1
eth0
eth1
eth2
eth3
eth4
eth3
eth1
Name: Router
IP Address: 203.0.113.254/24
207
©2020 Check Point Software Technologies Ltd.
Performance Objective:
• Prepare and schedule backups for the gateway.
Tasks:
• Schedule a Security Management Server backup to take place
every day at midnight
• Backup the Security Gateway cluster members from
SmartConsole
• Perform a backup via CLI
Lab 14.3: Backups
208
©2020 Check Point Software Technologies Ltd.
Thank you for participating in this course!!
Please take a few minutes to complete the
Student Satisfaction Survey. The survey will measure
your satisfaction with the training course delivery,
the instructor, training materials, and ATC facilities.
https://www.surveymonkey.com/r/CheckPointATC
Student
Satisfaction
Survey
209
©2020 Check Point Software Technologies Ltd.
THANK YOU!

Contenu connexe

Tendances

Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
ArianeSpano
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
Castleforce
 
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN
Ashutosh Kaushik
 

Tendances (20)

Tenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityTenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud Security
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
ClearPass Overview
ClearPass OverviewClearPass Overview
ClearPass Overview
 
Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
CompTIA Security+ SY0-601 Domain 1
CompTIA Security+ SY0-601 Domain 1CompTIA Security+ SY0-601 Domain 1
CompTIA Security+ SY0-601 Domain 1
 
Chapter 9 PowerPoint
Chapter 9 PowerPointChapter 9 PowerPoint
Chapter 9 PowerPoint
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wan
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
 
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN
 
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdf
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdfAryaka Bringing SASE to Life with a Zero Trust WAN.pdf
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdf
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdf
 
Cyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in DepthCyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in Depth
 
What is zero trust model of information security?
What is zero trust model of information security?What is zero trust model of information security?
What is zero trust model of information security?
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
 

Similaire à CCSA Treinamento_CheckPoint.pptx

Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed Microservices
Kai Wähner
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check Point
Harry Gunns
 
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxAuthentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
rock73
 

Similaire à CCSA Treinamento_CheckPoint.pptx (20)

Security as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionSecurity as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud Adoption
 
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBETENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
 
Security architecture proposal template
Security architecture proposal templateSecurity architecture proposal template
Security architecture proposal template
 
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed Microservices
 
Check Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private CloudCheck Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private Cloud
 
Performing One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust PrinciplesPerforming One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust Principles
 
Didiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - English
 
vSEC pro VMware NSX
vSEC pro VMware NSXvSEC pro VMware NSX
vSEC pro VMware NSX
 
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
 
Javier Hijas & Ori Kuyumgiski - Security at the speed of DevOps [rooted2018]
Javier Hijas & Ori Kuyumgiski	- Security at the speed of DevOps [rooted2018]Javier Hijas & Ori Kuyumgiski	- Security at the speed of DevOps [rooted2018]
Javier Hijas & Ori Kuyumgiski - Security at the speed of DevOps [rooted2018]
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
 
VPCs, Metrics Framework, Back pressure : MuleSoft Virtual Muleys Meetups
VPCs, Metrics Framework, Back pressure  : MuleSoft Virtual Muleys MeetupsVPCs, Metrics Framework, Back pressure  : MuleSoft Virtual Muleys Meetups
VPCs, Metrics Framework, Back pressure : MuleSoft Virtual Muleys Meetups
 
Learn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successfulLearn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successful
 
PCI DSS Compliance in the Cloud
PCI DSS Compliance in the CloudPCI DSS Compliance in the Cloud
PCI DSS Compliance in the Cloud
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check Point
 
Iot in-production
Iot in-productionIot in-production
Iot in-production
 
Managing Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesManaging Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust Principles
 
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxAuthentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 

CCSA Treinamento_CheckPoint.pptx

  • 1. 1 ©2020 Check Point Software Technologies Ltd. CHECK POINT CERTIFIED SECURITY ADMINISTRATOR R80.40 CCSA
  • 2. 2 ©2020 Check Point Software Technologies Ltd. Check Point: The Largest Global Cyber Security Company Global Leader – 100,000+ Customers, 88+ Countries, 6,200+ Partners Over 25 years of cutting edge technologies, Industry’s most visionary player Traded on Nasdaq since 1996 - CHKP 5000+ Employees worldwide, top talent Innovation leadership - more than twice the developers of closest competitor TRUSTED BY FORTUNE 500 COMPANIES
  • 3. 3 ©2020 Check Point Software Technologies Ltd. Mission Statement BUILDING SECURITY FOR THE FUTURE SECURE ANY ENVIRONMENT WE OPERATE IN DO IT EFFICIENTLY KEEPING THE ATTACKS OUTSIDE
  • 4. 4 ©2020 Check Point Software Technologies Ltd. • Infinity architecture: Consolidated security platform providing full threat prevention across the organization • New technology: Assist customers to securely innovate and grow by deploying new security technologies • Broader reach: Provide more companies with the ability to prevent attacks Check Point Strategy
  • 5. 5 ©2020 Check Point Software Technologies Ltd. Best Threat Prevention Across Entire Enterprise MOBILE Shared Threat Intelligence Consolidated Security Management ENDPOINT Hybrid Cloud NETWORK Perimeter & Data centers CLOUD
  • 6. 6 ©2020 Check Point Software Technologies Ltd. PREFACE CCSA R80.40
  • 7. 7 ©2020 Check Point Software Technologies Ltd. Check Point CHECKMATES CHECKMATES is a community of people passionate about cyber security! It is an interactive platform with a large crowd of users where they can discuss various topics, talk about challenges they face, develop and share API tools and scripts, discuss benefits of products and solutions, exchange ideas, ask questions related to all Check Point products and services, and interconnect through local CheckMates Live (local user group) events. To boost your professional career with Check Point, become a member of the CheckMates community and share your thoughts and experiences, follow technology trends, learn about the most recent products and features, and participant in your local CheckMates community. Use your UserCenter account to sign in and get started: https://community.checkpoint.com/
  • 8. 8 ©2020 Check Point Software Technologies Ltd. CCSA is recommended for the following professionals:  System Administrators  Support Analysis  Network Engineers
  • 9. 9 ©2020 Check Point Software Technologies Ltd. CCSA Course Chapters • Chapter 1: Introduction to Check Point Technology • Chapter 2: Introduction to Check Point Deployment • Chapter 3: Check Point Management Operations • Chapter 4: Licensing • Chapter 5: Security Policy Management • Chapter 6: Policy Layers • Chapter 7: Managing User Access • Chapter 8: Working with NAT • Chapter 9: Traffic Visibility • Chapter 10: Monitoring System States • Chapter 11: Security Events • Chapter 12: Basic Concepts of VPN • Chapter 13: Working with ClusterXL • Chapter 14: Compliance Tasks
  • 10. 10 ©2020 Check Point Software Technologies Ltd. Internal DMZ EXT Internet Name: A-GW-01 Mgmt Address: 10.1.1.2/24 Int Address: 192.168.11.2/24 Sync Address: 192.168.10.2/24 Ext Address: 203.0.113.2/24 DMZ Address: 192.168.12.2/24 Default GW: 203.0.113.254 SYNC Name: A-GW-02 Mgmt Address: 10.1.1.3/24 Int Address: 192.168.11.3/24 Sync Address: 192.168.10.3/24 Ext Address: 203.0.113.3/24 DMZ Address: 192.168.12.3/24 Default GW: 203.0.113.254 EXT NAT Management Internal Name: A-GW-Cluster Mgmt VIP: 10.1.1.1/24 Int VIP: 192.168.11.1/24 Ext VIP: 203.0.113.1/24 DMZ VIP: 192.168.12.1/24 IP Address: 10.1.1.201/24 Default GW: 10.1.1.1 IP Address: 10.1.1.101/24 Default GW: 10.1.1.1 Name: A-Host IP Address: 192.168.11.201/24 Default GW: 192.168.11.1 Name: A-LDAP IP Address: 192.168.11.101/24 Default GW: 192.168.11.1 Name: A-DMZ IP Address: 192.168.12.101/24 Default GW: 192.168.12.1 Name: B-GW Mgmt Address: Interface Disabled Int Address: 192.168.21.1/24 Sync Address: interface Disabled Ext Address: 203.0.113.100/24 Default GW: 203.0.113.254 Name: B-Host IP Address: 192.168.21.201/24 Default GW: 192.168.21.1 eth0 eth1 eth2 eth3 eth4 eth3 eth1 Name: Router IP Address: 203.0.113.254/24
  • 11. 11 ©2020 Check Point Software Technologies Ltd. Security administrators fill one of the most important roles in the information technology (IT) industry. They oversee issues related to IT security safety and ensure organizations’ computer networks and systems remain protected from all types of cyber threats. This includes configuring policy and adding passwords to servers, setting up firewalls and anti-virus protection, and restricting what users can and cannot do on the network. THE ROLE OF THE SECURITY ADMINISTRATOR
  • 12. 12 ©2020 Check Point Software Technologies Ltd. INTRODUCTION TO CHECKPOINT TECHNOLOGY Chapter One
  • 13. 13 ©2020 Check Point Software Technologies Ltd. • Describe the key elements of Check Point’s unified security management architecture. • Learn how Check Point firewalls are managed and network traffic is monitored. • Gain insight on how Check Point security features are enabled and policies applied. Learning Objectives
  • 14. 14 ©2020 Check Point Software Technologies Ltd. Security Architecture When connecting to the Internet, protecting the network against intrusion is of critical importance. The most effective way to secure the Internet link is to put a Firewall system between the local network and the Internet. • Security Management Server • SmartConsole • Security Gateway
  • 15. 15 ©2020 Check Point Software Technologies Ltd. Controlling Network Traffic • Packet Filtering • Stateful Inspection • Application Layer Firewall The Firewall, or the Security Gateway with a Firewall enabled, will deny or permit traffic based on rules defined in the Security Policy. The following technologies are used to deny or permit network traffic:
  • 16. 16 ©2020 Check Point Software Technologies Ltd. Packet Filtering Handling individual packets, the packet filter firewall applies rules to determine whether a packet can be allowed or disallowed. The firewall examines each packet based on the following criteria: • Source IP address • Destination IP address • TCP/UDP source port • TCP/UDP destination port
  • 17. 17 ©2020 Check Point Software Technologies Ltd. Controlling Network Traffic The most basic form of a Firewall. PACKET FILTERING Packets include the following elements: • Source address • Destination address • Source port • Destination port • Protocol
  • 18. 18 ©2020 Check Point Software Technologies Ltd. Controlling Network Traffic Technology developed and patented by Check Point. STATEFUL INSPECTION • Examines the context of a packet. • Monitors the state of the connect. • Uses Check Point’s INSPECT Engine to extract state related information from the packet.
  • 19. 19 ©2020 Check Point Software Technologies Ltd. Controlling Network Traffic • Examines the packet header • Requires two rules for each connection Packet Filtering • Examines the packet header and contents • Only one rule required for each connection Stateful Inspection How does Stateful Inspection and Packet Filtering Differ?
  • 20. 20 ©2020 Check Point Software Technologies Ltd. Controlling Network Traffic Includes the traditional functions of Packet Filtering and Stateful Inspection. • Provides granular level filtering, antivirus scanning, and access control. • Inspects traffic through the lower layers of the TCP/IP model and up to and including the application layer. APPLICATION FIREWALL
  • 21. 21 ©2020 Check Point Software Technologies Ltd. Review Questions 1. What are the three main components of the Check Point Architecture? 2. Why are State tables key components of the Stateful Inspection technology? 3. What is the main purpose for Security Gateways?
  • 22. 22 ©2020 Check Point Software Technologies Ltd. INTRODUCTION TO CHECK POINT DEPLOYMENT Chapter Two
  • 23. 23 ©2020 Check Point Software Technologies Ltd. • Understand Check Point deployment options. • Describe the basic functions of the Gaia operating system. Learning Objectives
  • 24. 24 ©2020 Check Point Software Technologies Ltd. Deployment Options Check Point appliances and open servers are the two main options for deploying Check Point technology. These deployment options encompass the processes typical of launching new software or hardware in an environment that runs properly. Examples include the following: • Check Point Appliances • Open Servers • Cloud Computing • Scalable Platforms Maestro Hyperscale Orchestrator
  • 25. 25 ©2020 Check Point Software Technologies Ltd. Check Point Appliances Strong and proven, Check Point security appliances provide reliable services for thousands of businesses worldwide. • Small Business and Branch Office • Enterprise Network Security • Data Center Security Systems • Chassis Systems • Rugged Appliances • And More Rugged Appliance
  • 26. 26 ©2020 Check Point Software Technologies Ltd. Deployment Considerations Each component in the network topology is distinguished by its IP address and netmask. The combination of components and their respective IP information make up the network topology.
  • 27. 27 ©2020 Check Point Software Technologies Ltd. Standalone Deployment In a Standalone deployment, the Security Management Server and Security Gateway are installed on the same computer or appliance. 1 Security Management Server 2 Standalone Server 3 Security Gateway Component
  • 28. 28 ©2020 Check Point Software Technologies Ltd. Distributed Deployment In a Distributed deployment, the Security Gateway and the Security Management Server are installed on different computers or appliances. 1 Security Management Server 2 Network Connection 3 Security Gateway
  • 29. 29 ©2020 Check Point Software Technologies Ltd. Bridge Mode Deployment A Bridge Mode deployment adds a Security Gateway to an existing environment without changing IP routing. 1 Switch 2 Router 3 Security Gateway Firewall bridging Layer-2 traffic over the one IP address, with a subnet on each side using the same address.
  • 30. 30 ©2020 Check Point Software Technologies Ltd. Introduction to the Gaia Operating System Gaia is Check Point’s operating system for all Check Point appliances and open servers. It supports the full portfolio of Check Point Software Blades, gateways, and security management products. It also supports: • IPv4 and IPv6 network protocols • High connection and virtual systems capacity (64 bits) • Load sharing • High availability • Dynamic and multi-cast routing
  • 31. 31 ©2020 Check Point Software Technologies Ltd. Gaia Portal The Gaia Portal (also known as WebUI) is an advanced, web-based interface used to configure Gaia platforms. A majority of system configuration tasks can be done through the Gaia Portal.
  • 32. 32 ©2020 Check Point Software Technologies Ltd. Gaia Portal Users Page The Gaia Portal and CLI can be used to manage user accounts and perform the following actions: • Add users to your Gaia system • Edit the home directory of the user • Edit the default shell for a user • Assign a password to a user • Assign privileges to users
  • 33. 33 ©2020 Check Point Software Technologies Ltd. • AdminRole Gives the user read/write access to all features. • MonitorRole Gives the user read-only access to all features. Gaia Pre-Defined Roles Gaia includes these pre-defined roles:
  • 34. 34 ©2020 Check Point Software Technologies Ltd. Roles are defined on the “Add Role” page of the WebUI. To add a new role or change an existing role select User Management > Roles in the WebUI navigation tree. Gaia Portal Add Role Window
  • 35. 35 ©2020 Check Point Software Technologies Ltd. • Gaia provides the ability to directly receive updates for licensed Check Point products. • With the Check Point Upgrade Service Engine (CPUSE), you can automatically update Check Point products. Check Point Upgrade Service Engine
  • 36. 36 ©2020 Check Point Software Technologies Ltd. Assigning Users to Roles in Gaia Portal 1. Select User Management > Roles in the WebUI navigation tree. 2. Click Assign Members. 3. In the Assign Members to Role window: • Double-click on user in the Available Users list to add that user to the role. • Double-click on user in the Users with Role list to remove that user from the role.
  • 37. 37 ©2020 Check Point Software Technologies Ltd. Gaia Commands Commands have the following syntax: operation feature parameter • To view all commands that the user has permissions to run: show commands • To view a list of all features: show commands feature <TAB> • To show all possible operations: show commands op <SPACE> <TAB> • To show the full system version information: show version all
  • 38. 38 ©2020 Check Point Software Technologies Ltd. Review Questions 1. What’s the difference between a Distributed Deployment and a Stand Alone Deployment? 2. What are the two main options for deploying Check Point technology? 3. What is a private package?
  • 39. 39 ©2020 Check Point Software Technologies Ltd. Lab 2.1- Installation of Primary Management Server Site Alpha Site Bravo Internal DMZ EXT C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y Internet Name: A-GW-01 Mgmt Address: 10.1.1.2/24 Int Address: 192.168.11.2/24 Sync Address: 192.168.10.2/24 Ext Address: 203.0.113.2/24 DMZ Address: 192.168.12.2/24 Default GW: 203.0.113.254 SYNC Name: A-GW-02 Mgmt Address: 10.1.1.3/24 Int Address: 192.168.11.3/24 Sync Address: 192.168.10.3/24 Ext Address: 203.0.113.3/24 DMZ Address: 192.168.12.3/24 Default GW: 203.0.113.254 EXT NAT Management Internal Name: A-GW-Cluster Mgmt VIP: 10.1.1.1/24 Int VIP: 192.168.11.1/24 Ext VIP: 203.0.113.1/24 DMZ VIP: 192.168.12.1/24 Name: A-GUI IP Address: 10.1.1.201/24 Default GW: 10.1.1.1 Name: A-SMS IP Address: 10.1.1.101/24 Default GW: 10.1.1.1 Name: A-Host IP Address: 192.168.11.201/24 Default GW: 192.168.11.1 Name: A-LDAP IP Address: 192.168.11.101/24 Default GW: 192.168.11.1 Name: A-DMZ IP Address: 192.168.12.101/24 Default GW: 192.168.12.1 Name: B-GW Mgmt Address: Interface Disabled Int Address: 192.168.21.1/24 Sync Address: interface Disabled Ext Address: 203.0.113.100/24 Default GW: 203.0.113.254 Name: B-Host IP Address: 192.168.21.201/24 Default GW: 192.168.21.1 eth0 eth1 eth2 eth3 eth4 eth3 eth1 Name: Router IP Address: 203.0.113.254/24
  • 40. 40 ©2020 Check Point Software Technologies Ltd. Performance Objectives: • Configure the Security Management Server • Use the WebUI to run the First Time Wizard • Install SmartConsole Tasks: • Install the Gaia OS • Configure the system as a Security Management Server Lab 2.1: Installation of Primary Management Server
  • 41. 41 ©2020 Check Point Software Technologies Ltd. Lab 2.2- Configuration of a Security Gateway Site Alpha Site Bravo Internal DMZ EXT C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y Internet Name: A-GW-01 Mgmt Address: 10.1.1.2/24 Int Address: 192.168.11.2/24 Sync Address: 192.168.10.2/24 Ext Address: 203.0.113.2/24 DMZ Address: 192.168.12.2/24 Default GW: 203.0.113.254 SYNC Name: A-GW-02 Mgmt Address: 10.1.1.3/24 Int Address: 192.168.11.3/24 Sync Address: 192.168.10.3/24 Ext Address: 203.0.113.3/24 DMZ Address: 192.168.12.3/24 Default GW: 203.0.113.254 EXT NAT Management Internal Name: A-GW-Cluster Mgmt VIP: 10.1.1.1/24 Int VIP: 192.168.11.1/24 Ext VIP: 203.0.113.1/24 DMZ VIP: 192.168.12.1/24 Name: A-GUI IP Address: 10.1.1.201/24 Default GW: 10.1.1.1 Name: A-SMS IP Address: 10.1.1.101/24 Default GW: 10.1.1.1 Name: A-Host IP Address: 192.168.11.201/24 Default GW: 192.168.11.1 Name: A-LDAP IP Address: 192.168.11.101/24 Default GW: 192.168.11.1 Name: A-DMZ IP Address: 192.168.12.101/24 Default GW: 192.168.12.1 Name: B-GW Mgmt Address: Interface Disabled Int Address: 192.168.21.1/24 Sync Address: interface Disabled Ext Address: 203.0.113.100/24 Default GW: 203.0.113.254 Name: B-Host IP Address: 192.168.21.201/24 Default GW: 192.168.21.1 eth0 eth1 eth2 eth3 eth4 eth3 eth1 Name: Router IP Address: 203.0.113.254/24
  • 42. 42 ©2020 Check Point Software Technologies Ltd. Performance Objectives: • Install the Alpha Cluster using the network detailed in the course topology Tasks: • Install Gaia on the A-GW-01 and A-GW-02 • Configure the Security Gateway with the First Time Configuration Wizard Lab 2.2: Configuration of a Security Gateway
  • 43. 43 ©2020 Check Point Software Technologies Ltd. CHECK POINT MANAGEMENT OPERATIONS Chapter Three
  • 44. 44 ©2020 Check Point Software Technologies Ltd. • Receive introduction to Security Internal Communication (SIC). • Recognize SmartConsole features, functions, and tools. • Understand how SmartConsole is used by administrators to grant permissions and user access. Learning Objectives
  • 45. 45 ©2020 Check Point Software Technologies Ltd. Network Communication Secure Internal Communication (SIC) • Creates trusted connections. • Required for policy installation and to send logs. • SIC methods include: • Certificates • Standards-based SSL for the creation of secure channels • 3DES or AES128 for encryption
  • 46. 46 ©2020 Check Point Software Technologies Ltd. Administrative Tasks in SmartConsole • Manage Security Policies • Monitor Events • Install Updates • Add New Devices and Appliances • Manage Multi-Domain Environments
  • 47. 47 ©2020 Check Point Software Technologies Ltd. The SmartConsole SmartConsole is a Graphical User Interface (GUI) used to manage the objects that represent network elements, servers, and gateways. These administrative activities are organized into the following tabs: • Gateways & Servers • Security Policies • Logs & Monitor • Manage & Settings
  • 48. 48 ©2020 Check Point Software Technologies Ltd. Logs & Monitor View The Logs & Monitor tab allows you to view graphs and pivot tables in an organized dashboard, search through logs, and schedule customizable reports.
  • 49. 49 ©2020 Check Point Software Technologies Ltd. Review Questions 1. Name one task that takes place in the Gateways & Servers tab: 2. When does a session occur?
  • 50. 50 ©2020 Check Point Software Technologies Ltd. Lab 3.1- Establishing Secure Internal Communication Site Alpha Site Bravo Internal DMZ EXT C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y Internet Name: A-GW-01 Mgmt Address: 10.1.1.2/24 Int Address: 192.168.11.2/24 Sync Address: 192.168.10.2/24 Ext Address: 203.0.113.2/24 DMZ Address: 192.168.12.2/24 Default GW: 203.0.113.254 SYNC Name: A-GW-02 Mgmt Address: 10.1.1.3/24 Int Address: 192.168.11.3/24 Sync Address: 192.168.10.3/24 Ext Address: 203.0.113.3/24 DMZ Address: 192.168.12.3/24 Default GW: 203.0.113.254 EXT NAT Management Internal Name: A-GW-Cluster Mgmt VIP: 10.1.1.1/24 Int VIP: 192.168.11.1/24 Ext VIP: 203.0.113.1/24 DMZ VIP: 192.168.12.1/24 Name: A-GUI IP Address: 10.1.1.201/24 Default GW: 10.1.1.1 Name: A-SMS IP Address: 10.1.1.101/24 Default GW: 10.1.1.1 Name: A-Host IP Address: 192.168.11.201/24 Default GW: 192.168.11.1 Name: A-LDAP IP Address: 192.168.11.101/24 Default GW: 192.168.11.1 Name: A-DMZ IP Address: 192.168.12.101/24 Default GW: 192.168.12.1 Name: B-GW Mgmt Address: Interface Disabled Int Address: 192.168.21.1/24 Sync Address: interface Disabled Ext Address: 203.0.113.100/24 Default GW: 203.0.113.254 Name: B-Host IP Address: 192.168.21.201/24 Default GW: 192.168.21.1 eth0 eth1 eth2 eth3 eth4 eth3 eth1 Name: Router IP Address: 203.0.113.254/24
  • 51. 51 ©2020 Check Point Software Technologies Ltd. Performance Objects: • Demonstrate how the Security Management Server and Gateways communicate • Test SIC status Tasks: • Create the Cluster and Gateway objects in SmartConsole • Establish SIC Lab 3.1: Establishing Secure Internal Communication
  • 52. 52 ©2020 Check Point Software Technologies Ltd. Lab 3.2- Administrator Access Site Alpha Site Bravo Internal DMZ EXT C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y Internet Name: A-GW-01 Mgmt Address: 10.1.1.2/24 Int Address: 192.168.11.2/24 Sync Address: 192.168.10.2/24 Ext Address: 203.0.113.2/24 DMZ Address: 192.168.12.2/24 Default GW: 203.0.113.254 SYNC Name: A-GW-02 Mgmt Address: 10.1.1.3/24 Int Address: 192.168.11.3/24 Sync Address: 192.168.10.3/24 Ext Address: 203.0.113.3/24 DMZ Address: 192.168.12.3/24 Default GW: 203.0.113.254 EXT NAT Management Internal Name: A-GW-Cluster Mgmt VIP: 10.1.1.1/24 Int VIP: 192.168.11.1/24 Ext VIP: 203.0.113.1/24 DMZ VIP: 192.168.12.1/24 Name: A-GUI IP Address: 10.1.1.201/24 Default GW: 10.1.1.1 Name: A-SMS IP Address: 10.1.1.101/24 Default GW: 10.1.1.1 Name: A-Host IP Address: 192.168.11.201/24 Default GW: 192.168.11.1 Name: A-LDAP IP Address: 192.168.11.101/24 Default GW: 192.168.11.1 Name: A-DMZ IP Address: 192.168.12.101/24 Default GW: 192.168.12.1 Name: B-GW Mgmt Address: Interface Disabled Int Address: 192.168.21.1/24 Sync Address: interface Disabled Ext Address: 203.0.113.100/24 Default GW: 203.0.113.254 Name: B-Host IP Address: 192.168.21.201/24 Default GW: 192.168.21.1 eth0 eth1 eth2 eth3 eth4 eth3 eth1 Name: Router IP Address: 203.0.113.254/24
  • 53. 53 ©2020 Check Point Software Technologies Ltd. Performance Objectives: • Create multiple administrators and apply different roles and permissions for current administration Tasks: • Create new administrators with varying permission profiles • Configure IPS • Test administrator access based on assigned profiles • View concurrent administrator activities • Disconnect an administrator session Lab 3.2: Administrator Access
  • 54. 54 ©2020 Check Point Software Technologies Ltd. LICENSING Chapter Four
  • 55. 55 ©2020 Check Point Software Technologies Ltd. • Learn how Check Point security solutions and products work and how they protect networks. • Understand licensing and contract requirements for Check Point security products. Learning Object
  • 56. 56 ©2020 Check Point Software Technologies Ltd. Licensing Overview Components of a License: • Features and functionality of purchased product • Specifies its terms of use • Maximum number of users, devices and/or IP addresses allotted for the product • Signature key • Certification key • Service contract data
  • 57. 57 ©2020 Check Point Software Technologies Ltd. Central & Local Licenses • Central licenses require an administrator to designate a gateway for attachment. • Local licenses are automatically attached to their respective Security Gateways.
  • 58. 58 ©2020 Check Point Software Technologies Ltd. Using the Gaia First Time Configuration Wizard, the appliance connects to the Check Point User Center and downloads all necessary licenses and contracts. License Activation
  • 59. 59 ©2020 Check Point Software Technologies Ltd. The automatic licensing feature performs the following operations: • Verifies Licenses • Activates New Licenses • Automatically Adds New Blades Automatic Licensing
  • 60. 60 ©2020 Check Point Software Technologies Ltd. Using SmartUpdate SmartUpdate tabs are divided into a tree structure that displays the packages installed and the licenses attached to each managed Security Gateway. The tree has the following three levels: • Root • Second • Third
  • 61. 61 ©2020 Check Point Software Technologies Ltd. Add & Install Licenses To install a license, you must first add it to the License & Contract Repository: 1. Launch SmartDistributer. 2. Navigate to the Licenses & Contracts tab. 3. From the Launch menu, choose Licenses & Contracts > Add License.
  • 62. 62 ©2020 Check Point Software Technologies Ltd. Steps to Export a License 1. In SmartUpdate, select a license from the License Repository and right-click. 2. From the menu, select Export License to File. 3. In the Choose File to Export License(s) To window, name the file or select an existing file and browse to the desired location.
  • 63. 63 ©2020 Check Point Software Technologies Ltd. License Status SmartConsole allows you to quickly reference the license status for each Software Blade per gateway.
  • 64. 64 ©2020 Check Point Software Technologies Ltd. Saving & Exporting License Status You may also save the status information as a PDF report or export the information to a file.
  • 65. 65 ©2020 Check Point Software Technologies Ltd. License Reports To generate a report of all licenses allocated for your full network environment: 1. Launch SmartConsole. 2. In the License Repository, right-click the object. 3. From the menu bar, select Action and then License Report. 4. Select the desired report format to be generated.
  • 66. 66 ©2020 Check Point Software Technologies Ltd. Service Contracts The Service Contract file enables compliance with current Check Point licensing standards.
  • 67. 67 ©2020 Check Point Software Technologies Ltd. Updating Contracts Contracts can be updated in SmartUpdate by using the Licenses & Contracts option provided under the Licenses & Contract tab menu.
  • 68. 68 ©2020 Check Point Software Technologies Ltd. Review Questions 1. Name the three types of Software Containers: 2. What are Subscription Blades? 3. Name one reason for generating and installing a new license?
  • 69. 69 ©2020 Check Point Software Technologies Ltd. Lab 4.1- Managing Licensing & Contracts in SmartUpdate Site Alpha Site Bravo Internal DMZ EXT C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y Internet Name: A-GW-01 Mgmt Address: 10.1.1.2/24 Int Address: 192.168.11.2/24 Sync Address: 192.168.10.2/24 Ext Address: 203.0.113.2/24 DMZ Address: 192.168.12.2/24 Default GW: 203.0.113.254 SYNC Name: A-GW-02 Mgmt Address: 10.1.1.3/24 Int Address: 192.168.11.3/24 Sync Address: 192.168.10.3/24 Ext Address: 203.0.113.3/24 DMZ Address: 192.168.12.3/24 Default GW: 203.0.113.254 EXT NAT Management Internal Name: A-GW-Cluster Mgmt VIP: 10.1.1.1/24 Int VIP: 192.168.11.1/24 Ext VIP: 203.0.113.1/24 DMZ VIP: 192.168.12.1/24 Name: A-GUI IP Address: 10.1.1.201/24 Default GW: 10.1.1.1 Name: A-SMS IP Address: 10.1.1.101/24 Default GW: 10.1.1.1 Name: A-Host IP Address: 192.168.11.201/24 Default GW: 192.168.11.1 Name: A-LDAP IP Address: 192.168.11.101/24 Default GW: 192.168.11.1 Name: A-DMZ IP Address: 192.168.12.101/24 Default GW: 192.168.12.1 Name: B-GW Mgmt Address: Interface Disabled Int Address: 192.168.21.1/24 Sync Address: interface Disabled Ext Address: 203.0.113.100/24 Default GW: 203.0.113.254 Name: B-Host IP Address: 192.168.21.201/24 Default GW: 192.168.21.1 eth0 eth1 eth2 eth3 eth4 eth3 eth1 Name: Router IP Address: 203.0.113.254/24
  • 70. 70 ©2020 Check Point Software Technologies Ltd. Performance Objective: • Validate existing licenses for products installed on the network. Tasks: • Verify the status of existing licenses in SmartConsole • Import Licenses • Attach Licenses • Verify the status of existing licenses in Gaia portal Lab 4.1: Managing Licensing & Contracts in SmartUpdate
  • 71. 71 ©2020 Check Point Software Technologies Ltd. SECURITY POLICY MANAGEMENT Chapter Five
  • 72. 72 ©2020 Check Point Software Technologies Ltd. • Describe the essential elements of a Security Policy. • Understand how traffic inspection takes place in a unified Security Policy. • Summarize how administration roles and permissions assist in managing policy. • Recall how to implement Check Point backup techniques. Learning Objectives
  • 73. 73 ©2020 Check Point Software Technologies Ltd. A Security Policy consists of a set of rules that define network security using a Rule Base. Once a Rule Base is defined, the Security Policy can be distributed to all Security Gateways across a network. Rules are comprised of network objects such as gateways, hosts, networks, routers, and domains and specifies the source, destination, service, and action to be taken for each session. Rules
  • 74. 74 ©2020 Check Point Software Technologies Ltd. A default rule is added when you add a rule to the Rule Base. These rules are configured using all objects, services and users installed on your database. Default Rule – AQUI!!!!
  • 75. 75 ©2020 Check Point Software Technologies Ltd. Object Management • Administrators can add, edit, delete, and clone objects. • The Object Explorer window in SmartConsole allows you to create new objects and edit existing objects.
  • 76. 76 ©2020 Check Point Software Technologies Ltd. Configuring Anti-Spoofing The Topology tab of the Interface Properties window allows you to configure Anti- Spoofing properties of a gateway.
  • 77. 77 ©2020 Check Point Software Technologies Ltd. • Cleanup Rule — A Cleanup rule is recommended to determine how to handle connections not matched by the rules above it in the Rule • Stealth Rule — A stealth rule is a rule that should be located as early in your policy as possible, typically immediately after any Management rules. Cleanup and Stealth Rules
  • 78. 78 ©2020 Check Point Software Technologies Ltd. Global Properties The Security Policy includes numerous settings that are configured as Global Properties. These settings apply to: • The Firewall • VPN • Reporting Tools • Check Point Products • Check Point Services & Functions
  • 79. 79 ©2020 Check Point Software Technologies Ltd. Sections When managing a large network, it can be helpful to divide the policy into smaller sections. Use section titles to more easily navigate between large rule bases.
  • 80. 80 ©2020 Check Point Software Technologies Ltd. Publish Policy Publishing updates the policy on the management server and/or Log Server and makes the changes visible in SmartConsole.
  • 81. 81 ©2020 Check Point Software Technologies Ltd. Policy Types There are four policy types available for each policy package: • Access Control • QoS • Desktop Security • Threat Prevention
  • 82. 82 ©2020 Check Point Software Technologies Ltd. Shared Policies The Shared Policies section in a policy package provides access to these granular Software Blades and features: • Mobile Access • Data Loss Prevention • HTTPS Inspection • Geo Policy
  • 83. 83 ©2020 Check Point Software Technologies Ltd. Additional Policy Management Tools Access Control Tools Include: • VPN Communities • Client Certificates • Application Wiki • Installation History
  • 84. 84 ©2020 Check Point Software Technologies Ltd. Install Policy There are two types of installation modes: • Installs the policy on each target gateway independently. • Installs the policy on all target gateways.
  • 85. 85 ©2020 Check Point Software Technologies Ltd. Review Questions 1. Name one thing that a basic rule consists of? 2. What are the building blocks of Security Policy rules? 3. What is the purpose of the UserCheck?
  • 86. 86 ©2020 Check Point Software Technologies Ltd. Lab 5.1- Creating Security Policy – Creating Objects Site Alpha Site Bravo Internal DMZ EXT C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y Internet Name: A-GW-01 Mgmt Address: 10.1.1.2/24 Int Address: 192.168.11.2/24 Sync Address: 192.168.10.2/24 Ext Address: 203.0.113.2/24 DMZ Address: 192.168.12.2/24 Default GW: 203.0.113.254 SYNC Name: A-GW-02 Mgmt Address: 10.1.1.3/24 Int Address: 192.168.11.3/24 Sync Address: 192.168.10.3/24 Ext Address: 203.0.113.3/24 DMZ Address: 192.168.12.3/24 Default GW: 203.0.113.254 EXT NAT Management Internal Name: A-GW-Cluster Mgmt VIP: 10.1.1.1/24 Int VIP: 192.168.11.1/24 Ext VIP: 203.0.113.1/24 DMZ VIP: 192.168.12.1/24 Name: A-GUI IP Address: 10.1.1.201/24 Default GW: 10.1.1.1 Name: A-SMS IP Address: 10.1.1.101/24 Default GW: 10.1.1.1 Name: A-Host IP Address: 192.168.11.201/24 Default GW: 192.168.11.1 Name: A-LDAP IP Address: 192.168.11.101/24 Default GW: 192.168.11.1 Name: A-DMZ IP Address: 192.168.12.101/24 Default GW: 192.168.12.1 Name: B-GW Mgmt Address: Interface Disabled Int Address: 192.168.21.1/24 Sync Address: interface Disabled Ext Address: 203.0.113.100/24 Default GW: 203.0.113.254 Name: B-Host IP Address: 192.168.21.201/24 Default GW: 192.168.21.1 eth0 eth1 eth2 eth3 eth4 eth3 eth1 Name: Router IP Address: 203.0.113.254/24
  • 87. 87 ©2020 Check Point Software Technologies Ltd. Performance Objective: • Create and configure host, network and group objects Task: • Create new host, network and group objects Lab 5.1: Creating Security Policy – Creating Objects
  • 88. 88 ©2020 Check Point Software Technologies Ltd. Lab 5.2- Creating Security Policy – Creating Rules Site Alpha Site Bravo Internal DMZ EXT C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y Internet Name: A-GW-01 Mgmt Address: 10.1.1.2/24 Int Address: 192.168.11.2/24 Sync Address: 192.168.10.2/24 Ext Address: 203.0.113.2/24 DMZ Address: 192.168.12.2/24 Default GW: 203.0.113.254 SYNC Name: A-GW-02 Mgmt Address: 10.1.1.3/24 Int Address: 192.168.11.3/24 Sync Address: 192.168.10.3/24 Ext Address: 203.0.113.3/24 DMZ Address: 192.168.12.3/24 Default GW: 203.0.113.254 EXT NAT Management Internal Name: A-GW-Cluster Mgmt VIP: 10.1.1.1/24 Int VIP: 192.168.11.1/24 Ext VIP: 203.0.113.1/24 DMZ VIP: 192.168.12.1/24 Name: A-GUI IP Address: 10.1.1.201/24 Default GW: 10.1.1.1 Name: A-SMS IP Address: 10.1.1.101/24 Default GW: 10.1.1.1 Name: A-Host IP Address: 192.168.11.201/24 Default GW: 192.168.11.1 Name: A-LDAP IP Address: 192.168.11.101/24 Default GW: 192.168.11.1 Name: A-DMZ IP Address: 192.168.12.101/24 Default GW: 192.168.12.1 Name: B-GW Mgmt Address: Interface Disabled Int Address: 192.168.21.1/24 Sync Address: interface Disabled Ext Address: 203.0.113.100/24 Default GW: 203.0.113.254 Name: B-Host IP Address: 192.168.21.201/24 Default GW: 192.168.21.1 eth0 eth1 eth2 eth3 eth4 eth3 eth1 Name: Router IP Address: 203.0.113.254/24
  • 89. 89 ©2020 Check Point Software Technologies Ltd. Performance Objective: • Use SmartConsole to create the network policy Tasks: • Create rules using the objects created in previous lab • Create Check Point recommended rules Lab 5.2: Creating Security Policy – Creating Rules
  • 90. 90 ©2020 Check Point Software Technologies Ltd. Lab 5.3 – Monitoring Policy Status Site Alpha Site Bravo Internal DMZ EXT C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y Internet Name: A-GW-01 Mgmt Address: 10.1.1.2/24 Int Address: 192.168.11.2/24 Sync Address: 192.168.10.2/24 Ext Address: 203.0.113.2/24 DMZ Address: 192.168.12.2/24 Default GW: 203.0.113.254 SYNC Name: A-GW-02 Mgmt Address: 10.1.1.3/24 Int Address: 192.168.11.3/24 Sync Address: 192.168.10.3/24 Ext Address: 203.0.113.3/24 DMZ Address: 192.168.12.3/24 Default GW: 203.0.113.254 EXT NAT Management Internal Name: A-GW-Cluster Mgmt VIP: 10.1.1.1/24 Int VIP: 192.168.11.1/24 Ext VIP: 203.0.113.1/24 DMZ VIP: 192.168.12.1/24 Name: A-GUI IP Address: 10.1.1.201/24 Default GW: 10.1.1.1 Name: A-SMS IP Address: 10.1.1.101/24 Default GW: 10.1.1.1 Name: A-Host IP Address: 192.168.11.201/24 Default GW: 192.168.11.1 Name: A-LDAP IP Address: 192.168.11.101/24 Default GW: 192.168.11.1 Name: A-DMZ IP Address: 192.168.12.101/24 Default GW: 192.168.12.1 Name: B-GW Mgmt Address: Interface Disabled Int Address: 192.168.21.1/24 Sync Address: interface Disabled Ext Address: 203.0.113.100/24 Default GW: 203.0.113.254 Name: B-Host IP Address: 192.168.21.201/24 Default GW: 192.168.21.1 eth0 eth1 eth2 eth3 eth4 eth3 eth1 Name: Router IP Address: 203.0.113.254/24
  • 91. 91 ©2020 Check Point Software Technologies Ltd. Performance Objectives: • Install the Security Policy • Monitor and review the status Tasks: • Install policy • Monitor and review the policy install status • Review an Audit log for the policy install Lab 5.3: Monitoring Policy Status
  • 92. 92 ©2020 Check Point Software Technologies Ltd. POLICY LAYERS Chapter Six
  • 93. 93 ©2020 Check Point Software Technologies Ltd. • Understand the Check Point policy layer concept. • Understand how policy layers affect traffic inspection. • Understand how to enable the Application Control and URL Filtering software blades to block access to various applications. Learning Objectives
  • 94. 94 ©2020 Check Point Software Technologies Ltd. Policy Layer Concept When working with Policy Layers, the Manage Layers window is used. To open the Manage Layers window, select Menu > Manage Policies and Layers in SmartConsole.
  • 95. 95 ©2020 Check Point Software Technologies Ltd. Manage Policies and Layers The window below serves as a dashboard for policies and layers. The specific columns on the dashboard are identified with a corresponding number and definition in the list below: • Layer - Shows the name of the layer • Number of Rules - Shows the number • of rules • Modifier - Shows the last user • Last Modified - Shows the date and time • Blades - Shows the Blades • Used in policies - Specifies the • policy package • Mode - Shows ordered or inline layer
  • 96. 96 ©2020 Check Point Software Technologies Ltd. Manage Policies and Layers When possible, it is a best practice to share policy layers with other policy packages. To enable this, check the “Multiple policies and rules can use this layer” checkbox.
  • 97. 97 ©2020 Check Point Software Technologies Ltd. Review Questions 1. How does a Rule Base work with a Security Policy? 2. Which blades can be enabled on a layer? 3. What are the two layer options?
  • 98. 98 ©2020 Check Point Software Technologies Ltd. Lab 6.1 – Ordered Layers Site Alpha Site Bravo Internal DMZ EXT C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y Internet Name: A-GW-01 Mgmt Address: 10.1.1.2/24 Int Address: 192.168.11.2/24 Sync Address: 192.168.10.2/24 Ext Address: 203.0.113.2/24 DMZ Address: 192.168.12.2/24 Default GW: 203.0.113.254 SYNC Name: A-GW-02 Mgmt Address: 10.1.1.3/24 Int Address: 192.168.11.3/24 Sync Address: 192.168.10.3/24 Ext Address: 203.0.113.3/24 DMZ Address: 192.168.12.3/24 Default GW: 203.0.113.254 EXT NAT Management Internal Name: A-GW-Cluster Mgmt VIP: 10.1.1.1/24 Int VIP: 192.168.11.1/24 Ext VIP: 203.0.113.1/24 DMZ VIP: 192.168.12.1/24 Name: A-GUI IP Address: 10.1.1.201/24 Default GW: 10.1.1.1 Name: A-SMS IP Address: 10.1.1.101/24 Default GW: 10.1.1.1 Name: A-Host IP Address: 192.168.11.201/24 Default GW: 192.168.11.1 Name: A-LDAP IP Address: 192.168.11.101/24 Default GW: 192.168.11.1 Name: A-DMZ IP Address: 192.168.12.101/24 Default GW: 192.168.12.1 Name: B-GW Mgmt Address: Interface Disabled Int Address: 192.168.21.1/24 Sync Address: interface Disabled Ext Address: 203.0.113.100/24 Default GW: 203.0.113.254 Name: B-Host IP Address: 192.168.21.201/24 Default GW: 192.168.21.1 eth0 eth1 eth2 eth3 eth4 eth3 eth1 Name: Router IP Address: 203.0.113.254/24
  • 99. 99 ©2020 Check Point Software Technologies Ltd. Performance Objectives: • Demonstrate how to share a layer between Security Policies Tasks: • Add a Data Awareness layer to the Standard policy • Configure the Application Control and URL Filtering Rule Base • Share the new Data Awareness layer Lab 6.1: Ordered Layers
  • 100. 100 ©2020 Check Point Software Technologies Ltd. Lab 6.2 – Inline Layers Site Alpha Site Bravo Internal DMZ EXT C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y Internet Name: A-GW-01 Mgmt Address: 10.1.1.2/24 Int Address: 192.168.11.2/24 Sync Address: 192.168.10.2/24 Ext Address: 203.0.113.2/24 DMZ Address: 192.168.12.2/24 Default GW: 203.0.113.254 SYNC Name: A-GW-02 Mgmt Address: 10.1.1.3/24 Int Address: 192.168.11.3/24 Sync Address: 192.168.10.3/24 Ext Address: 203.0.113.3/24 DMZ Address: 192.168.12.3/24 Default GW: 203.0.113.254 EXT NAT Management Internal Name: A-GW-Cluster Mgmt VIP: 10.1.1.1/24 Int VIP: 192.168.11.1/24 Ext VIP: 203.0.113.1/24 DMZ VIP: 192.168.12.1/24 Name: A-GUI IP Address: 10.1.1.201/24 Default GW: 10.1.1.1 Name: A-SMS IP Address: 10.1.1.101/24 Default GW: 10.1.1.1 Name: A-Host IP Address: 192.168.11.201/24 Default GW: 192.168.11.1 Name: A-LDAP IP Address: 192.168.11.101/24 Default GW: 192.168.11.1 Name: A-DMZ IP Address: 192.168.12.101/24 Default GW: 192.168.12.1 Name: B-GW Mgmt Address: Interface Disabled Int Address: 192.168.21.1/24 Sync Address: interface Disabled Ext Address: 203.0.113.100/24 Default GW: 203.0.113.254 Name: B-Host IP Address: 192.168.21.201/24 Default GW: 192.168.21.1 eth0 eth1 eth2 eth3 eth4 eth3 eth1 Name: Router IP Address: 203.0.113.254/24
  • 101. 101 ©2020 Check Point Software Technologies Ltd. Performance Objectives: • Demonstrate how to create an inline layer and share this layer between policies Task: • Create an Inline layer Lab 6.2: Inline Layers
  • 102. 102 ©2020 Check Point Software Technologies Ltd. MANAGING USER ACCESS Chapter Seven
  • 103. 103 ©2020 Check Point Software Technologies Ltd. • Recognize how to define users and user groups. • Understand how to manage user access for internal and external users. • Describe Identity Awareness components and configurations. Learning Objectives
  • 104. 104 ©2020 Check Point Software Technologies Ltd. Overview of User Management Components • Services allowed • Locations allowed to access network • Allowed network destinations • Time frame to connect • Time frame to access network • Authentication process • Working remotely process Users are created for use as network objects in Security Policies and to define the different terms under which users can operate, such as:
  • 105. 105 ©2020 Check Point Software Technologies Ltd. User Directory • Leverages LDAP Servers to obtain identification • Eliminates Risk of manual maintaining & synchronizing data • Enables centralized user management • Query user information, CRL retrieval, authenticate users • Recommended with large user count • requires a special license- included in Mobile access Blade
  • 106. 106 ©2020 Check Point Software Technologies Ltd. Identity Awareness • Network location • The identity of a user • The identity of a machine Identity Awareness lets you easily configure network access and auditing based on one or more of the following items:
  • 107. 107 ©2020 Check Point Software Technologies Ltd. Active Directory (AD) Query The Active Directory Query is a clientless identity acquisition method that allows the Security Gateway to seamlessly identify Active Directory users and computers.
  • 108. 108 ©2020 Check Point Software Technologies Ltd. Captive Portal for Guest Access When users try to access a resource, they are directed to a web page requiring them to enter login credentials for verification.
  • 109. 109 ©2020 Check Point Software Technologies Ltd. Adding a User from LDAP Managing users internally differs when incorporating LDAP: • User management in User Directory is handled externally and not locally. • User Directory server templates, unlike internal user templates, can be modified and applied to users dynamically.
  • 110. 110 ©2020 Check Point Software Technologies Ltd. Access Roles Access roles are objects that allow you to configure network access according to: • Networks • User and user groups • Computers and computer groups • Remote access clients
  • 111. 111 ©2020 Check Point Software Technologies Ltd. Access Policy Rules After Identity Awareness has been activated, you can create access role objects and use them in the Source and Destination columns of Access Control policy rules.
  • 112. 112 ©2020 Check Point Software Technologies Ltd. Rule Base Using Identity Awareness, you can define a policy rule for specified users who send traffic from specified computers or from any computer. The following is an example of a rule that redirects the user to the Captive Portal.
  • 113. 113 ©2020 Check Point Software Technologies Ltd. Review Questions 1. What purpose does the User Directory serve? 2. Name one of the items the Identity Awareness lets you configure network access and auditing based on? 3. Name one authentication scheme that Check Point supports:
  • 114. 114 ©2020 Check Point Software Technologies Ltd. Lab 7.1 – Provide User Access Site Alpha Site Bravo Internal DMZ EXT C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y Internet Name: A-GW-01 Mgmt Address: 10.1.1.2/24 Int Address: 192.168.11.2/24 Sync Address: 192.168.10.2/24 Ext Address: 203.0.113.2/24 DMZ Address: 192.168.12.2/24 Default GW: 203.0.113.254 SYNC Name: A-GW-02 Mgmt Address: 10.1.1.3/24 Int Address: 192.168.11.3/24 Sync Address: 192.168.10.3/24 Ext Address: 203.0.113.3/24 DMZ Address: 192.168.12.3/24 Default GW: 203.0.113.254 EXT NAT Management Internal Name: A-GW-Cluster Mgmt VIP: 10.1.1.1/24 Int VIP: 192.168.11.1/24 Ext VIP: 203.0.113.1/24 DMZ VIP: 192.168.12.1/24 Name: A-GUI IP Address: 10.1.1.201/24 Default GW: 10.1.1.1 Name: A-SMS IP Address: 10.1.1.101/24 Default GW: 10.1.1.1 Name: A-Host IP Address: 192.168.11.201/24 Default GW: 192.168.11.1 Name: A-LDAP IP Address: 192.168.11.101/24 Default GW: 192.168.11.1 Name: A-DMZ IP Address: 192.168.12.101/24 Default GW: 192.168.12.1 Name: B-GW Mgmt Address: Interface Disabled Int Address: 192.168.21.1/24 Sync Address: interface Disabled Ext Address: 203.0.113.100/24 Default GW: 203.0.113.254 Name: B-Host IP Address: 192.168.21.201/24 Default GW: 192.168.21.1 eth0 eth1 eth2 eth3 eth4 eth3 eth1 Name: Router IP Address: 203.0.113.254/24
  • 115. 115 ©2020 Check Point Software Technologies Ltd. Performance Objectives: • Enable Identity Awareness • Deploy user access roles for more granular control of the Security policy Tasks: • Configure the Security Policy for Identity Awareness • Define the user access role • Test Identity Awareness connection Lab 7.1: Provide User Access
  • 116. 116 ©2020 Check Point Software Technologies Ltd. WORKING WITH NAT Chapter Eight
  • 117. 117 ©2020 Check Point Software Technologies Ltd. • Articulate how Network Address Translation (NAT) affects traffic. • Describe how to configure manual and automatic NAT. Learning Objectives
  • 118. 118 ©2020 Check Point Software Technologies Ltd. NAT Rules NAT rules modify the IP address information associated with traffic packets as they pass through the Security Gateway. The expected behavior of the gateway is based on the type of NAT rule configured and how the rule is applied within the flow of traffic. NAT can be configured on Check Point hosts, nodes, networks, address ranges and dynamic objects.
  • 119. 119 ©2020 Check Point Software Technologies Ltd. Manual and Automatic NAT • Automatic NAT • Configured through the Network Object, the Host Object, and the Address Range Object • Supports Hide and Static NAT • Manual NAT • Offers more flexibility • Can allow the translation of both the source and destination of the packet • Supports Hide and Static NAT
  • 120. 120 ©2020 Check Point Software Technologies Ltd. NAT Configuration NAT can be configured by manually creating rules in the NAT policy or enabling NAT on the desired network object. Then the rules are created automatically.
  • 121. 121 ©2020 Check Point Software Technologies Ltd. Review Questions 1. What is the difference between Hide NAT and Static NAT? 2. What are the three ranges of IP addresses that are designated by RFC 1918 as private and non-routable on the Internet?
  • 122. 122 ©2020 Check Point Software Technologies Ltd. Lab 8.1 – Automatic NAT Configuration Site Alpha Site Bravo Internal DMZ EXT C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y Internet Name: A-GW-01 Mgmt Address: 10.1.1.2/24 Int Address: 192.168.11.2/24 Sync Address: 192.168.10.2/24 Ext Address: 203.0.113.2/24 DMZ Address: 192.168.12.2/24 Default GW: 203.0.113.254 SYNC Name: A-GW-02 Mgmt Address: 10.1.1.3/24 Int Address: 192.168.11.3/24 Sync Address: 192.168.10.3/24 Ext Address: 203.0.113.3/24 DMZ Address: 192.168.12.3/24 Default GW: 203.0.113.254 EXT NAT Management Internal Name: A-GW-Cluster Mgmt VIP: 10.1.1.1/24 Int VIP: 192.168.11.1/24 Ext VIP: 203.0.113.1/24 DMZ VIP: 192.168.12.1/24 Name: A-GUI IP Address: 10.1.1.201/24 Default GW: 10.1.1.1 Name: A-SMS IP Address: 10.1.1.101/24 Default GW: 10.1.1.1 Name: A-Host IP Address: 192.168.11.201/24 Default GW: 192.168.11.1 Name: A-LDAP IP Address: 192.168.11.101/24 Default GW: 192.168.11.1 Name: A-DMZ IP Address: 192.168.12.101/24 Default GW: 192.168.12.1 Name: B-GW Mgmt Address: Interface Disabled Int Address: 192.168.21.1/24 Sync Address: interface Disabled Ext Address: 203.0.113.100/24 Default GW: 203.0.113.254 Name: B-Host IP Address: 192.168.21.201/24 Default GW: 192.168.21.1 eth0 eth1 eth2 eth3 eth4 eth3 eth1 Name: Router IP Address: 203.0.113.254/24
  • 123. 123 ©2020 Check Point Software Technologies Ltd. Performance Objectives: • Configure Network Address Translation for server and network objects Tasks: • Configure Hide NAT on network objects • Configure Static NAT on the servers Lab 8.1: Automatic NAT Configuration
  • 124. 124 ©2020 Check Point Software Technologies Ltd. TRAFFIC VISIBILITY Chapter Nine
  • 125. 125 ©2020 Check Point Software Technologies Ltd. • Identify tools designed to monitor data, determine threats, and recognize opportunities for performance improvements. • Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users, traffic flow patterns, and other security activities. Learning Objectives
  • 126. 126 ©2020 Check Point Software Technologies Ltd. Analyzing Logs Collecting logs helps with analyzing network traffic patterns and meeting compliance requirements.
  • 127. 127 ©2020 Check Point Software Technologies Ltd. Deploy Logging The following steps detail the workflow for deploying logging: 1. Install one or more standalone Log Servers. 2. In SmartConsole, enable logging on the management server. 3. Configure the Security Gateways to send logs to the Log Server.
  • 128. 128 ©2020 Check Point Software Technologies Ltd. SmartConsole Logs View Using the Logs View, administrators can examine audit logs from administrator activities and run custom queries using pre-defined search filters.
  • 129. 129 ©2020 Check Point Software Technologies Ltd. Track Options & Settings The Track Settings window displays these two advanced tracking options if one or more Application & URL Filtering, Content Awareness, or Mobile Access Software Blades are enabled on the layer: • Detailed Log • Extended Log
  • 130. 130 ©2020 Check Point Software Technologies Ltd. Log Details • Log details include log information, policy and traffic flow details. • Details can be viewed by double clicking on the log.
  • 131. 131 ©2020 Check Point Software Technologies Ltd. Custom Queries • Custom queries can also be created and saved for future use. The Favorites list stores saved custom queries. • Additional folders can be created to organize the customized queries.
  • 132. 132 ©2020 Check Point Software Technologies Ltd. Field Keywords Use pre-defined fields, followed by a colon, as keywords in filter criteria. A table displays pre- defined fields and keyword aliases that can be used as alternatives.
  • 133. 133 ©2020 Check Point Software Technologies Ltd. Review Questions 1. What is the purpose for collecting logs? 2. Name at lease one single search filter when creating log queries? 3. What are Boolean operators?
  • 134. 134 ©2020 Check Point Software Technologies Ltd. Lab 9.1 – Generate and View Traffic Site Alpha Site Bravo Internal DMZ EXT C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y Internet Name: A-GW-01 Mgmt Address: 10.1.1.2/24 Int Address: 192.168.11.2/24 Sync Address: 192.168.10.2/24 Ext Address: 203.0.113.2/24 DMZ Address: 192.168.12.2/24 Default GW: 203.0.113.254 SYNC Name: A-GW-02 Mgmt Address: 10.1.1.3/24 Int Address: 192.168.11.3/24 Sync Address: 192.168.10.3/24 Ext Address: 203.0.113.3/24 DMZ Address: 192.168.12.3/24 Default GW: 203.0.113.254 EXT NAT Management Internal Name: A-GW-Cluster Mgmt VIP: 10.1.1.1/24 Int VIP: 192.168.11.1/24 Ext VIP: 203.0.113.1/24 DMZ VIP: 192.168.12.1/24 Name: A-GUI IP Address: 10.1.1.201/24 Default GW: 10.1.1.1 Name: A-SMS IP Address: 10.1.1.101/24 Default GW: 10.1.1.1 Name: A-Host IP Address: 192.168.11.201/24 Default GW: 192.168.11.1 Name: A-LDAP IP Address: 192.168.11.101/24 Default GW: 192.168.11.1 Name: A-DMZ IP Address: 192.168.12.101/24 Default GW: 192.168.12.1 Name: B-GW Mgmt Address: Interface Disabled Int Address: 192.168.21.1/24 Sync Address: interface Disabled Ext Address: 203.0.113.100/24 Default GW: 203.0.113.254 Name: B-Host IP Address: 192.168.21.201/24 Default GW: 192.168.21.1 eth0 eth1 eth2 eth3 eth4 eth3 eth1 Name: Router IP Address: 203.0.113.254/24
  • 135. 135 ©2020 Check Point Software Technologies Ltd. Performance Objective: • Generate network traffic and use traffic visibility tools to monitor the data Task: • View live logs and perform searches to gather historic data Lab 9.1: Generate and View Traffic
  • 136. 136 ©2020 Check Point Software Technologies Ltd. MONITORING SYSTEM STATES Chapter Ten
  • 137. 137 ©2020 Check Point Software Technologies Ltd. • Articulate how Security Management Servers and Security Gateways work together to monitor the state of the Security Enforcement System Learning Objectives
  • 138. 138 ©2020 Check Point Software Technologies Ltd. Monitor Gateway Status To see gateway status in SmartConsole, in the Gateways & Servers tab, select a gateway, right click, and select Monitor.
  • 139. 139 ©2020 Check Point Software Technologies Ltd. Users View • Open Sessions • Overlapping Sessions • Route Traffic • Connection Time • And More The Users view of SmartView Monitor shows users that have a current VPN connection to the Security Gateways. It displays the following:
  • 140. 140 ©2020 Check Point Software Technologies Ltd. System Counters View The System Counters View in SmartConsole shows collected information on the status and activities of Check Point products.
  • 141. 141 ©2020 Check Point Software Technologies Ltd. Tunnels View • The SmartView Monitor Tunnels view shows the status of gateway-to- gateway VPN tunnels. • Use this view to identify VPN tunnel malfunctions and connectivity problems.
  • 142. 142 ©2020 Check Point Software Technologies Ltd. Traffic View SmartConsole Traffic Monitoring provides in-depth details on network traffic and activity.
  • 143. 143 ©2020 Check Point Software Technologies Ltd. Review Questions 1. The monitoring views of SmartConsole and SmartView Monitor show real-time and historical graphical views of: 2. What does SAM stand for and what does it monitor? 3. Where can alerts be seen?
  • 144. 144 ©2020 Check Point Software Technologies Ltd. Lab 10.1 – Automatic NAT Configuration Site Alpha Site Bravo Internal DMZ EXT C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y Internet Name: A-GW-01 Mgmt Address: 10.1.1.2/24 Int Address: 192.168.11.2/24 Sync Address: 192.168.10.2/24 Ext Address: 203.0.113.2/24 DMZ Address: 192.168.12.2/24 Default GW: 203.0.113.254 SYNC Name: A-GW-02 Mgmt Address: 10.1.1.3/24 Int Address: 192.168.11.3/24 Sync Address: 192.168.10.3/24 Ext Address: 203.0.113.3/24 DMZ Address: 192.168.12.3/24 Default GW: 203.0.113.254 EXT NAT Management Internal Name: A-GW-Cluster Mgmt VIP: 10.1.1.1/24 Int VIP: 192.168.11.1/24 Ext VIP: 203.0.113.1/24 DMZ VIP: 192.168.12.1/24 Name: A-GUI IP Address: 10.1.1.201/24 Default GW: 10.1.1.1 Name: A-SMS IP Address: 10.1.1.101/24 Default GW: 10.1.1.1 Name: A-Host IP Address: 192.168.11.201/24 Default GW: 192.168.11.1 Name: A-LDAP IP Address: 192.168.11.101/24 Default GW: 192.168.11.1 Name: A-DMZ IP Address: 192.168.12.101/24 Default GW: 192.168.12.1 Name: B-GW Mgmt Address: Interface Disabled Int Address: 192.168.21.1/24 Sync Address: interface Disabled Ext Address: 203.0.113.100/24 Default GW: 203.0.113.254 Name: B-Host IP Address: 192.168.21.201/24 Default GW: 192.168.21.1 eth0 eth1 eth2 eth3 eth4 eth3 eth1 Name: Router IP Address: 203.0.113.254/24
  • 145. 145 ©2020 Check Point Software Technologies Ltd. Performance Objective: • Use SmartView Monitor to view status, alerts and block suspicious traffic Tasks: • Monitor status of the systems • Configure alerts • Configure Suspicious Activity Rules Lab 10.1: Monitoring System States
  • 146. 146 ©2020 Check Point Software Technologies Ltd. SECURITY EVENTS Chapter 11
  • 147. 147 ©2020 Check Point Software Technologies Ltd. • Understand how SmartEvent functions to identify critical security issues. • Identify SmartEvent components used to store network activity logs and identify events. • Explain how SmartEvent eliminates security threats targeting organizations. • Understand how SmartEvent can assist in reporting security threats targeting organizations. Learning Objectives
  • 148. 148 ©2020 Check Point Software Technologies Ltd. Threat Detection Increasingly, Security Administrators have to know how to prevent, detect and mitigate a range of sophisticated cyber security attacks. Check Point’s SmartEvent Software Blade identifies critical security events such as intrusion, Bot incidents, and potential data loss before they occur.
  • 149. 149 ©2020 Check Point Software Technologies Ltd. The SmartEvent Solution SmartEvent correlates logs and detects real security threats. SmartEvent is a licensed Software Blade and can be installed on a single server or across multiple correlation units to reduce the network load.
  • 150. 150 ©2020 Check Point Software Technologies Ltd. SmartEvent Management To enable SmartEvent on the Security Management Server, take the following steps: • Open SmartConsole. • Open the Security Management Server network object. • On the Management tab, enable Software Blades. • In the SmartConsole main toolbar, click Publish.
  • 151. 151 ©2020 Check Point Software Technologies Ltd. Event Analysis SmartConsole, SmartView Web Application, and the SmartEvent GUI client consolidate billions of logs and show them as prioritized security events so you can immediately respond to security incidents, and do the necessary actions to prevent more attacks.
  • 152. 152 ©2020 Check Point Software Technologies Ltd. Reporting Security Events Pre-defined and customized reports can be generated to provide security information on a schedule (daily, weekly, or monthly), or as needed.
  • 153. 153 ©2020 Check Point Software Technologies Ltd. Using Pre-Defined Reports To open the catalog of predefined and customized reports, click the [+] tab.
  • 154. 154 ©2020 Check Point Software Technologies Ltd. Security CheckUp With Check Point Security Checkup tools, administrators can generate a comprehensive security analysis report that summarizes: • Security Events • Security Risks • Remediation
  • 155. 155 ©2020 Check Point Software Technologies Ltd. Lab 11.1 – Automatic NAT Configuration Site Alpha Site Bravo Internal DMZ EXT C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y Internet Name: A-GW-01 Mgmt Address: 10.1.1.2/24 Int Address: 192.168.11.2/24 Sync Address: 192.168.10.2/24 Ext Address: 203.0.113.2/24 DMZ Address: 192.168.12.2/24 Default GW: 203.0.113.254 SYNC Name: A-GW-02 Mgmt Address: 10.1.1.3/24 Int Address: 192.168.11.3/24 Sync Address: 192.168.10.3/24 Ext Address: 203.0.113.3/24 DMZ Address: 192.168.12.3/24 Default GW: 203.0.113.254 EXT NAT Management Internal Name: A-GW-Cluster Mgmt VIP: 10.1.1.1/24 Int VIP: 192.168.11.1/24 Ext VIP: 203.0.113.1/24 DMZ VIP: 192.168.12.1/24 Name: A-GUI IP Address: 10.1.1.201/24 Default GW: 10.1.1.1 Name: A-SMS IP Address: 10.1.1.101/24 Default GW: 10.1.1.1 Name: A-Host IP Address: 192.168.11.201/24 Default GW: 192.168.11.1 Name: A-LDAP IP Address: 192.168.11.101/24 Default GW: 192.168.11.1 Name: A-DMZ IP Address: 192.168.12.101/24 Default GW: 192.168.12.1 Name: B-GW Mgmt Address: Interface Disabled Int Address: 192.168.21.1/24 Sync Address: interface Disabled Ext Address: 203.0.113.100/24 Default GW: 203.0.113.254 Name: B-Host IP Address: 192.168.21.201/24 Default GW: 192.168.21.1 eth0 eth1 eth2 eth3 eth4 eth3 eth1 Name: Router IP Address: 203.0.113.254/24
  • 156. 156 ©2020 Check Point Software Technologies Ltd. Review Questions 1. What is a Certificate Sharing Event? 2. Name one component in the SmartEvent architecture? 3. Why does the SmartEvent Server communicate with the Security Management Server?
  • 157. 157 ©2020 Check Point Software Technologies Ltd. Performance Objectives: • Configure a SmartEvent Server to monitor relevant patterns and events. • Demonstrate how to configure event Alerts in SmartEvent. • Demonstrate how to run specific SmartEvent reports. Tasks: • Configure the SmartEvent Suite. • Generate Reports based on available data. Lab 11.1: Evaluating Threats with SmartEvent
  • 158. 158 ©2020 Check Point Software Technologies Ltd. BASIC CONCEPTS OF VPN Chapter Twelve
  • 159. 159 ©2020 Check Point Software Technologies Ltd. • Understand Site-to-Site and Remote Access VPN deployments and communities. • Understand how to analyze and interpret VPN tunnel traffic. Learning Objectives
  • 160. 160 ©2020 Check Point Software Technologies Ltd. VPN Components • VPN Domain • VPN Gateway • VPN Community • VPN Trust Entities • VPN Management Tools The following components are used to construct VPN communication in the network:
  • 161. 161 ©2020 Check Point Software Technologies Ltd. Site-to-Site VPN Deployment Handles secure communication between offices that are connected by the Internet.
  • 162. 162 ©2020 Check Point Software Technologies Ltd. Remote Access VPN Deployment A Remote Access VPN deployment handles secure communication between internal corporate resources and remote users using VPN tunnels.
  • 163. 163 ©2020 Check Point Software Technologies Ltd. VPN Communities When configuring a VPN gateway in SmartConsole, decide which IP address objects are included in the VPN domain. The System Administrators combine multiple VPN domains into a VPN community.
  • 164. 164 ©2020 Check Point Software Technologies Ltd. Meshed VPN Community A Meshed VPN community consists of VPN gateways that create VPN tunnels with all the other VPN gateways in the community.
  • 165. 165 ©2020 Check Point Software Technologies Ltd. Star VPN Community A Star VPN community can be used when a company must share information with external partners or companies.
  • 166. 166 ©2020 Check Point Software Technologies Ltd. VPN Routing VPN Routing is a way of directing communication through a specific tunnel in order to enhance existing connectivity or security.
  • 167. 167 ©2020 Check Point Software Technologies Ltd. Combination VPN Communities Combination VPN Communities are more complex VPN deployment scenarios. A combination VPN community can be defined by using for example, two Star VPN communities and one Meshed VPN community.
  • 168. 168 ©2020 Check Point Software Technologies Ltd. Access Control for VPN Connections Configure rules in the Access Control policy to allow the connections between the VPN gateways. The VPN column in the Access Control policy is used to configure how VPN connections are matched to the rules.
  • 169. 169 ©2020 Check Point Software Technologies Ltd. Access Control for VPN Connections Allow All Connections Allow All Site-to-Site VPN Connections Allow Specific VPN Communities
  • 170. 170 ©2020 Check Point Software Technologies Ltd. Site-to-Site Communities — Allow All Encrypted Traffic Configure a Site-to-Site VPN community to automatically allow all encrypted connections. Use the Accept all encrypted traffic option to configure the Firewall to allow all VPN traffic to the internal networks for the VPN communities.
  • 171. 171 ©2020 Check Point Software Technologies Ltd. Permanent Tunnels can only be established between Check Point VPN gateways. Permanent VPN Tunnels can be set on the following: • On all tunnels in the community • On all tunnels for specific gateways • On specific tunnels in the community Permanent VPN Tunnels
  • 172. 172 ©2020 Check Point Software Technologies Ltd. The SmartView Monitor GUI displays the status of the VPN tunnels in the network. Monitoring VPN Tunnels
  • 173. 173 ©2020 Check Point Software Technologies Ltd. Review Questions 1. How does a VPN provide privacy and security? 2. Why are Permanent VPN tunnels constantly kept active? 3. What is Tunnel Testing?
  • 174. 174 ©2020 Check Point Software Technologies Ltd. Lab 12.1 – Basic VPN Establishment Site Alpha Site Bravo Internal DMZ EXT C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y Internet Name: A-GW-01 Mgmt Address: 10.1.1.2/24 Int Address: 192.168.11.2/24 Sync Address: 192.168.10.2/24 Ext Address: 203.0.113.2/24 DMZ Address: 192.168.12.2/24 Default GW: 203.0.113.254 SYNC Name: A-GW-02 Mgmt Address: 10.1.1.3/24 Int Address: 192.168.11.3/24 Sync Address: 192.168.10.3/24 Ext Address: 203.0.113.3/24 DMZ Address: 192.168.12.3/24 Default GW: 203.0.113.254 EXT NAT Management Internal Name: A-GW-Cluster Mgmt VIP: 10.1.1.1/24 Int VIP: 192.168.11.1/24 Ext VIP: 203.0.113.1/24 DMZ VIP: 192.168.12.1/24 Name: A-GUI IP Address: 10.1.1.201/24 Default GW: 10.1.1.1 Name: A-SMS IP Address: 10.1.1.101/24 Default GW: 10.1.1.1 Name: A-Host IP Address: 192.168.11.201/24 Default GW: 192.168.11.1 Name: A-LDAP IP Address: 192.168.11.101/24 Default GW: 192.168.11.1 Name: A-DMZ IP Address: 192.168.12.101/24 Default GW: 192.168.12.1 Name: B-GW Mgmt Address: Interface Disabled Int Address: 192.168.21.1/24 Sync Address: interface Disabled Ext Address: 203.0.113.100/24 Default GW: 203.0.113.254 Name: B-Host IP Address: 192.168.21.201/24 Default GW: 192.168.21.1 eth0 eth1 eth2 eth3 eth4 eth3 eth1 Name: Router IP Address: 203.0.113.254/24
  • 175. 175 ©2020 Check Point Software Technologies Ltd. Performance Objectives: • Configure and deploy a site-to-site VPN • Test the VPN connection and analyze the tunnel traffic Tasks: • Define the VPN domain • Define the VPN community • Create the VPN rule and modify the Rule Base • Test the VPN connection Lab 12.1: Basic VPN Establishment
  • 176. 176 ©2020 Check Point Software Technologies Ltd. WORKING WITH CLUSTERXL Chapter Thirteen
  • 177. 177 ©2020 Check Point Software Technologies Ltd. • Understand the basic concepts of ClusterXL technology and its advantages. Learning Objectives
  • 178. 178 ©2020 Check Point Software Technologies Ltd. Overview of ClusterXL • Provides Security Gateway redundancy and load sharing. • Uses State Synchronization to keep active connections alive and prevent data loss when a member fails. • Two or more Security Gateways configured to act as one unit.
  • 179. 179 ©2020 Check Point Software Technologies Ltd. ClusterXL Topology ClusterXL uses unique physical IP and MAC addresses for the cluster members and virtual IP addresses to represent the cluster itself. Each cluster member has at least three interfaces: • One External Interface • One Internal Interface • One for Synchronization
  • 180. 180 ©2020 Check Point Software Technologies Ltd. Configuring Member Priority Gateway cluster members are listed in SmartConsole by priority. The highest priority member is the active cluster member by default.
  • 181. 181 ©2020 Check Point Software Technologies Ltd. There are two High Availability modes available: ClusterXL and VRRP. ClusterXL High Availability mode designates one of the cluster members as the Active machine, while the rest of the members are in a Standby mode. Configuring High Availability
  • 182. 182 ©2020 Check Point Software Technologies Ltd. Use SmartView Monitor to stop ClusterXL on a Security Gateway and cause a failover. In SmartView Monitor, right- click the cluster member, and select Cluster Member > Stop Member. Perform Manual Failover
  • 183. 183 ©2020 Check Point Software Technologies Ltd. Monitoring a Cluster In order to ensure that clusters and cluster members are operating correctly, the cphaprob state command from the CLI is used to monitor cluster members and critical devices.
  • 184. 184 ©2020 Check Point Software Technologies Ltd. Review Questions 1. What is the Cluster Control Protocol (CCP)? 2. Which command is used to monitor cluster members ? 3. Describe a situation that causes a failover to take place on the active cluster member?
  • 185. 185 ©2020 Check Point Software Technologies Ltd. Lab 13.1 – Working with ClusterXL Site Alpha Site Bravo Internal DMZ EXT C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y Internet Name: A-GW-01 Mgmt Address: 10.1.1.2/24 Int Address: 192.168.11.2/24 Sync Address: 192.168.10.2/24 Ext Address: 203.0.113.2/24 DMZ Address: 192.168.12.2/24 Default GW: 203.0.113.254 SYNC Name: A-GW-02 Mgmt Address: 10.1.1.3/24 Int Address: 192.168.11.3/24 Sync Address: 192.168.10.3/24 Ext Address: 203.0.113.3/24 DMZ Address: 192.168.12.3/24 Default GW: 203.0.113.254 EXT NAT Management Internal Name: A-GW-Cluster Mgmt VIP: 10.1.1.1/24 Int VIP: 192.168.11.1/24 Ext VIP: 203.0.113.1/24 DMZ VIP: 192.168.12.1/24 Name: A-GUI IP Address: 10.1.1.201/24 Default GW: 10.1.1.1 Name: A-SMS IP Address: 10.1.1.101/24 Default GW: 10.1.1.1 Name: A-Host IP Address: 192.168.11.201/24 Default GW: 192.168.11.1 Name: A-LDAP IP Address: 192.168.11.101/24 Default GW: 192.168.11.1 Name: A-DMZ IP Address: 192.168.12.101/24 Default GW: 192.168.12.1 Name: B-GW Mgmt Address: Interface Disabled Int Address: 192.168.21.1/24 Sync Address: interface Disabled Ext Address: 203.0.113.100/24 Default GW: 203.0.113.254 Name: B-Host IP Address: 192.168.21.201/24 Default GW: 192.168.21.1 eth0 eth1 eth2 eth3 eth4 eth3 eth1 Name: Router IP Address: 203.0.113.254/24
  • 186. 186 ©2020 Check Point Software Technologies Ltd. Performance Objective: • Test ClusterXL High Availability Tasks: • Review High Availability settings • Test High Availability Lab 13.1: Working with ClusterXL
  • 187. 187 ©2020 Check Point Software Technologies Ltd. COMPLIANCE TASKS Chapter Fourteen
  • 188. 188 ©2020 Check Point Software Technologies Ltd. • Knowledge about how to perform periodic administrator tasks. • Introduction to the Compliance Software Blade. • Understand how to use CPView to gather basic gateway status information. Learning Objectives
  • 189. 189 ©2020 Check Point Software Technologies Ltd. Understand how to perform periodic administrator tasks as specified in administrator job descriptions. Administrator Task Implementation
  • 190. 190 ©2020 Check Point Software Technologies Ltd. Compliance Software Blade The Compliance Software Blade is used to continuously scan the Security Policy and configuration settings defined within the following: • Check Point Software Blades • Security Gateways • Security Management Server
  • 191. 191 ©2020 Check Point Software Technologies Ltd. Best Practices The Compliance Software Blade compares policy and configuration changes against best practices before any changes are installed.
  • 192. 192 ©2020 Check Point Software Technologies Ltd. Compliance Best Practice Test A best practice test details compliance status and recommends corrective action. There are two types of tests - Global and Object-Based. • Global tests examine configuration settings for the entire organization. • Object-Based tests examine the configuration settings for particular objects, such as gateways and profiles.
  • 193. 193 ©2020 Check Point Software Technologies Ltd. Alerts & Actions When a best practice test detects a degradation to the compliance status, such as when a rule is changed, an alert is displayed with details of the issue devices.
  • 194. 194 ©2020 Check Point Software Technologies Ltd. CPView Use CPView to quickly view general system information Basic syntax is: cpview [-c <file>] [history {on | off | stat}] [-t]
  • 195. 195 ©2020 Check Point Software Technologies Ltd. Overview View The Overview view is the main view of CPView. It displays a summary of the main performance components in the system, such as memory and network bits per second.
  • 196. 196 ©2020 Check Point Software Technologies Ltd. SysInfo The SysInfo view shows general information about the system such as system uptime, version, and hardware information.
  • 197. 197 ©2020 Check Point Software Technologies Ltd. Network View There are three sub-views which provides additional traffic information broken down by network interface: • Interfaces • Top-Protocols • Top-Connections
  • 198. 198 ©2020 Check Point Software Technologies Ltd. CPU View The CPU view displays an overview of the current status of each CPU. There are two subviews: • Top-Protocols • Top-Connections
  • 199. 199 ©2020 Check Point Software Technologies Ltd. Software-blades View The Software-blades view shows statistics related to specific blades, including VPN, IDA (Identity Awareness), DLP, Threat Extraction, and Data Awareness.
  • 200. 200 ©2020 Check Point Software Technologies Ltd. Advanced View The Advanced View provides detailed utilization and counter statistics for advanced diagnosis. The main view displays CPU_Profiler information. Sub-views include: • Memory • Network • SecureXL • ClusterXL • CoreXL • PrioQ • Streaming • RAD • UP • HTTP-Parser
  • 201. 201 ©2020 Check Point Software Technologies Ltd. Review Questions 1. How are best practice scores determined and displayed? 2. What key is used to save the current CPView page to a file?
  • 202. 202 ©2020 Check Point Software Technologies Ltd. Lab 14.1 – Policy Tuning Site Alpha Site Bravo Internal DMZ EXT C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y Internet Name: A-GW-01 Mgmt Address: 10.1.1.2/24 Int Address: 192.168.11.2/24 Sync Address: 192.168.10.2/24 Ext Address: 203.0.113.2/24 DMZ Address: 192.168.12.2/24 Default GW: 203.0.113.254 SYNC Name: A-GW-02 Mgmt Address: 10.1.1.3/24 Int Address: 192.168.11.3/24 Sync Address: 192.168.10.3/24 Ext Address: 203.0.113.3/24 DMZ Address: 192.168.12.3/24 Default GW: 203.0.113.254 EXT NAT Management Internal Name: A-GW-Cluster Mgmt VIP: 10.1.1.1/24 Int VIP: 192.168.11.1/24 Ext VIP: 203.0.113.1/24 DMZ VIP: 192.168.12.1/24 Name: A-GUI IP Address: 10.1.1.201/24 Default GW: 10.1.1.1 Name: A-SMS IP Address: 10.1.1.101/24 Default GW: 10.1.1.1 Name: A-Host IP Address: 192.168.11.201/24 Default GW: 192.168.11.1 Name: A-LDAP IP Address: 192.168.11.101/24 Default GW: 192.168.11.1 Name: A-DMZ IP Address: 192.168.12.101/24 Default GW: 192.168.12.1 Name: B-GW Mgmt Address: Interface Disabled Int Address: 192.168.21.1/24 Sync Address: interface Disabled Ext Address: 203.0.113.100/24 Default GW: 203.0.113.254 Name: B-Host IP Address: 192.168.21.201/24 Default GW: 192.168.21.1 eth0 eth1 eth2 eth3 eth4 eth3 eth1 Name: Router IP Address: 203.0.113.254/24
  • 203. 203 ©2020 Check Point Software Technologies Ltd. Performance Objective: • Enable the compliance software blade Task: • Activate the compliance software blade Lab 14.1: Policy Tuning
  • 204. 204 ©2020 Check Point Software Technologies Ltd. Lab 14.2 – CPView Site Alpha Site Bravo Internal DMZ EXT C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y Internet Name: A-GW-01 Mgmt Address: 10.1.1.2/24 Int Address: 192.168.11.2/24 Sync Address: 192.168.10.2/24 Ext Address: 203.0.113.2/24 DMZ Address: 192.168.12.2/24 Default GW: 203.0.113.254 SYNC Name: A-GW-02 Mgmt Address: 10.1.1.3/24 Int Address: 192.168.11.3/24 Sync Address: 192.168.10.3/24 Ext Address: 203.0.113.3/24 DMZ Address: 192.168.12.3/24 Default GW: 203.0.113.254 EXT NAT Management Internal Name: A-GW-Cluster Mgmt VIP: 10.1.1.1/24 Int VIP: 192.168.11.1/24 Ext VIP: 203.0.113.1/24 DMZ VIP: 192.168.12.1/24 Name: A-GUI IP Address: 10.1.1.201/24 Default GW: 10.1.1.1 Name: A-SMS IP Address: 10.1.1.101/24 Default GW: 10.1.1.1 Name: A-Host IP Address: 192.168.11.201/24 Default GW: 192.168.11.1 Name: A-LDAP IP Address: 192.168.11.101/24 Default GW: 192.168.11.1 Name: A-DMZ IP Address: 192.168.12.101/24 Default GW: 192.168.12.1 Name: B-GW Mgmt Address: Interface Disabled Int Address: 192.168.21.1/24 Sync Address: interface Disabled Ext Address: 203.0.113.100/24 Default GW: 203.0.113.254 Name: B-Host IP Address: 192.168.21.201/24 Default GW: 192.168.21.1 eth0 eth1 eth2 eth3 eth4 eth3 eth1 Name: Router IP Address: 203.0.113.254/24
  • 205. 205 ©2020 Check Point Software Technologies Ltd. Performance Objectives: • Perform periodic tasks as specified in administrator job descriptions • Understand how to use CPView to gather basic gateway status information Tasks: • Review statistics in CPView • Change the refresh rate of CPView • View historical data • Save CPView statistics to a file Lab 14.2: CPView
  • 206. 206 ©2020 Check Point Software Technologies Ltd. Lab 14.3 – Backups Site Alpha Site Bravo Internal DMZ EXT C h e c k P o i n t R 8 0 . 4 0 C C S A L a b T o p o l o g y Internet Name: A-GW-01 Mgmt Address: 10.1.1.2/24 Int Address: 192.168.11.2/24 Sync Address: 192.168.10.2/24 Ext Address: 203.0.113.2/24 DMZ Address: 192.168.12.2/24 Default GW: 203.0.113.254 SYNC Name: A-GW-02 Mgmt Address: 10.1.1.3/24 Int Address: 192.168.11.3/24 Sync Address: 192.168.10.3/24 Ext Address: 203.0.113.3/24 DMZ Address: 192.168.12.3/24 Default GW: 203.0.113.254 EXT NAT Management Internal Name: A-GW-Cluster Mgmt VIP: 10.1.1.1/24 Int VIP: 192.168.11.1/24 Ext VIP: 203.0.113.1/24 DMZ VIP: 192.168.12.1/24 Name: A-GUI IP Address: 10.1.1.201/24 Default GW: 10.1.1.1 Name: A-SMS IP Address: 10.1.1.101/24 Default GW: 10.1.1.1 Name: A-Host IP Address: 192.168.11.201/24 Default GW: 192.168.11.1 Name: A-LDAP IP Address: 192.168.11.101/24 Default GW: 192.168.11.1 Name: A-DMZ IP Address: 192.168.12.101/24 Default GW: 192.168.12.1 Name: B-GW Mgmt Address: Interface Disabled Int Address: 192.168.21.1/24 Sync Address: interface Disabled Ext Address: 203.0.113.100/24 Default GW: 203.0.113.254 Name: B-Host IP Address: 192.168.21.201/24 Default GW: 192.168.21.1 eth0 eth1 eth2 eth3 eth4 eth3 eth1 Name: Router IP Address: 203.0.113.254/24
  • 207. 207 ©2020 Check Point Software Technologies Ltd. Performance Objective: • Prepare and schedule backups for the gateway. Tasks: • Schedule a Security Management Server backup to take place every day at midnight • Backup the Security Gateway cluster members from SmartConsole • Perform a backup via CLI Lab 14.3: Backups
  • 208. 208 ©2020 Check Point Software Technologies Ltd. Thank you for participating in this course!! Please take a few minutes to complete the Student Satisfaction Survey. The survey will measure your satisfaction with the training course delivery, the instructor, training materials, and ATC facilities. https://www.surveymonkey.com/r/CheckPointATC Student Satisfaction Survey
  • 209. 209 ©2020 Check Point Software Technologies Ltd. THANK YOU!