Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
August 2002
In This Document
The Trial Period VPN-1 FireWall-1 SecuRemote/SecureClient SmartCenter page 1 page 1 page 3 page 5 page 6 ClusterXL SecurePlatform SmartView Monitor UserAuthority FloodGate-1 Profile Based Management Provider-1/SiteManager-1 page 7 page 7 page 8 page 8 page 9 page 9 page 10
VPN-1
Support of SSL and SSH connections to VPN-1 Net Modules
Remote Device management using SSH or HTTPS (including the Voyager Web administration tool for Nokia platforms) is available for VPN-1 Net Modules. This is regardless of the policy type installed on the device, using implied rules configuration.
VPN Routing
The VPN Routing feature enables a VPN router to support back-to-back encryption, where the same connection is encrypted and decrypted against two peer gateways. Using a routing configuration file: Back to back tunnels can be configured on a single gateway. VPN path which is composed of more than one VPN tunnel can be Internal CA Enhancements
VPN Communities
Each VPN-1 Gateway can now participate both in a traditional and in a VPN communities based policy. The VPN-1 Gateway configuration process has been improved: Better separation between VPN communities and traditional mode: traditional mode configuration is now available from the VPN tab of each VPN-1 object.
Simpler configuration of Remote Access VPN. Global properties for remote access VPN have been restructured into three sections: VPN - Basic, VPN Advanced and Certificates. Traffic of certain protocols and services to passed in the clear can be configured on the community: A new tab (Services in Clear) has been added to the community properties. The tab allows services to be excluded from the community. A conversion tool from traditional mode to VPN communities is now available. This tool provides a simple way to transition from an older rule base to a new one. When using VPN communities, pre-shared secret for IKE can be defined for external VPN modules. Internal VPN-1 modules continue using Internal CA certificates while negotiating VPN tunnels.
VPN-1 Clusters
Interface resolving mechanisms for gateway-to-gateway and client-to-gateway VPN connections have been improved and added to the SmartDashboard on VPN-1 Gateways and in the Global Properties Multiple (Dynamic) interface resolving using RDP polling mechanism is now supported when the responding VPN-1 Gateway is hidden behind a VPN-1 cluster VPNx driver is now part of the VPN-1 installation. No additional package installation is required. To maximize the VPN performance, it is recommended to remove any previously installed VPNx packages. VPNx activation/deactivation is now possible using Check Point configuration tool (cpconfig). On Windows platforms VPNx is deactivated by default while on Solaris and Linux platforms VPNx is activated by default. VPNx performance is greatly improved on Windows platforms. VPN throughput has been improved by up to 80%, while packet rate has been increased by up to 60%.
IKE Interoperability
INITIAL CONTACT payloads are supported.
NAT-Related Issues
VPN Diagnostics
SmartView monitor for VPN-1 provides a comprehensive view of VPN, including tunnel establishment/failure rates, encrypted data rates, hardware acceleration rates and compression rates. VPN status monitoring using command line has been restructured and improved.
FireWall-1
SmartDefense
SmartDefense provides a unified security framework for components that identify and prevent cyber attack. The SmartDefense package is now integrated into the Check Point Suite. Protection against Denial of Service attacks: In order to avoid exhaustion of the connection table when under a UDP (or other protocol) flood attack, it is possible to define a quota for UDP (or other non TCP protocol) connections. When the number of non-TCP connections reaches the quota, only new TCP connections will be allowed. The non-TCP quota is disabled by default and it can be set individually for each FireWall-1 Module. The performance and scalability of NAT has been improved. NAT rules are searched much more efficiently, and a cache has been added for recent NAT lookups. The NAT rule number for log entries is shown in the Log Manager. Dynamic Objects can be used in the NAT Rule Base. Overlapping NAT support. FireWall-1 is able to handle packets from overlapping IP networks coming from differences interfaces of the FireWall-1 gateway. When entering the FireWall these packets are translated to a virtual IP network and when leaving the machine they are translated back to their original IP address.
The lowest possible port used by FireWall-1 when performing hide NAT can be controlled using the Global property hide_min_high_port. This is in addition to the global property hide_max_high_port that controls the highest possible port used by FireWall-1 when performing hide NAT on a connection whose original source port is > 1024 The range of high ports used by NAT Hide is now configurable via the global properties hide_max_high_port, that defines the maximal high port used by NAT Hide, and by hide_min_high_port, that defines the minimal high port used by NAT Hide. These properties can be modified using the dbedit utility. When a FireWall-1 gateway performs a RADIUS authentication, it can use RADIUS servers associated with the gateway object, thus overriding the RADIUS server associated with the specific user object. If this association does not exist, the FireWall-1 Gateway will use, as before, the RADIUS Servers object associated to the user object. Specified users can be prevented from using the FireWall-1 to RADIUS server association. Native SecurID ACE version 5 agent is supported for all platforms. Multiple generic user authentication profiles (called External User Profiles) can be used, in place of the *generic profile previously available. RADIUS and Windows NT groups are supported. The group membership of a user can be retrieved when using the RADIUS or the Windows NT authentication object. Based on this information FireWall-1 can match rules that are defined with these rules. Such group are defined with a special prefix to indicate this behavior. This eliminates the need to associate a user with groups in the SmartDashboard. This information is updated dynamically whenever the user authenticates.
Authentication
Security Servers
The Security Servers can decode the following character encoding schemes when used in URLs or inside HTTP or SMTP content: UTF-8 UUencode '&#' encodings (numerical references) This decoding capability is enabled by changing the following global properties to true and installing the policy: http_web_encoding and smtp_mail_encoding. The HTTP Security Server now supports by default the WebDAV HTTP methods (as specified in RFC 2518). These methods are required for email access over HTTP by some sites (e.g. Hotmail).
Services
Simple Object Access Protocol (SOAP), a standard for application data sharing over the Internet using HTTP, is supported. SOAP relies on XML to encode the information and then adds the necessary HTTP headers to send it. Using URI resources, FireWall-1 is able to parse SOAP version 1.1 traffic and validate its integrity according to a user defined scheme. SOAP functionality is available via a new tab in the URI resource window. New Multicast support. The router-alert IP option used by IGMP protocol is supported. IGMP is used for Multicast group membership management. In earlier versions, FireWall-1 dropped all packets with IP options (including IGMP). X11 (X Window graphics system for UNIX) is blocked by default when it is matched with a rule that has Any service. This prevents a potential security misconfiguration where Any s used to allow outbound connections for protected servers. If such X11 connectivity is required, it should be allowed explicitly by a rule that uses this service. The old behavior can be restored by setting the reject_x11_in_any global property to false, though this is not recommended. The Windows NT performance DLL is no longer included in FireWall-1. The Axent Pathways Defender authentication method is not longer supported.
Discontinued Features
SecuRemote/SecureClient
Connect Mode
Connect Mode profiles can be created and distributed from the SmartCenter Server (via topology). DSL support when working with Connect Mode. Dialup connection can be selected from the SecureClient connect dialog Disconnects dialup. The client will first attempt to connect to the gateway specified in the profile. Automatic topology update is performed with the connected gateway. Five new SCV checks have been included in the SecureClient installation. They are available as a separate package for use with older (pre-NG FP3) clients. The checks verify the following: Whether a process is running. Whether the user is logged on to a specific group (in domain or local machine). The operating system version, Service Pack, Screen Saver configuration. Operating system security patches. Internet security Settings (4 parameters in each security zone), browser version (major/minor). Enhanced VPN diagnostics and suggestions to the end user. Ability to run tests on the VPN tunnel, connection or similar (ping, tunnel test, DNS resolving, URL fetching). Export Connect/Disconnect capabilities to third party applications. Enable third party SCV packages to start and stop SecureClient. Install wizard runs external batch/executable according to product.ini.
Diagnostics Tool
Office Mode
Office mode is now supported on Windows NT/2000/XP.
SmartCenter
SmartCenter Server
The Revision Control feature has been enhanced to allows the restoration of an earlier version of the database, using a SmartDashboard wizard. Previously, snapshots of the database, including policies and objects could be created.
Policy Installation
The handling of established connections when installing a policy can be set using the SmartDashboard. The following options are available: 1. Keep all connections - No connections will be removed from the connection table, even if they are not allowed by the new security policy. 2. Keep data connections - Data connections will not be removed from the connection table, even if they are not allowed by the new security policy. 3. Rematch connections (default option) - data connections will be removed, and all other connections are rematched against the new security policy.
SmartUpdate
Product packages can be downloaded directly from the Check Point Download Center to the SmartUpdate Product Repository Licenses can be downloaded directly from the User Center to the SmartUpdate License Repository The SecurePlatform operating system and Performance Pack can be remotely upgraded Information about the latest available software updates is sent directly from the Check Point Download Center to SmartUpdate. Command line to remotely stop, start and restart Check Point services (cpstop, cpstart and cprestart). UserAuthority and WebAccess can be remotely installed All products on multiple remote Gateways can be remotely upgraded in parallel using a simple SmartUpdate wizard. The same product package can be used for all installation scenarios: new installation, upgrades from version 4.1 and upgrade from NG Alerts can be configured to indicate when licenses are about to expire. It is also possible to search for expired licenses.
ClusterXL
Cluster and cluster member objects in the SmartDashboard are much easier to define, following an extensive redesign of the objects. The state of the cluster members can be controlled from the Status Manager. The state of a cluster member can be changed to Up or Down with no need to access the cluster member modules. A new High Availability mode (New CPHA) enables remote management, and a one click transition to Load Sharing mode. New CPHA mode uses unique unicast IP addresses and MAC addresses, rather than sharing the IP and MAC address among the cluster members. New CPHA mode and the Load sharing modes now use multicasts instead of broadcasts for the clustering protocol. This significantly reduces cluster protocol traffic in the network. The security policy is now fetched first from another cluster member. If no other cluster member is available, the policy is fetched from the management. This ensures that the policy in the cluster will be consistent. VLANs are now supported on Linux platforms, including SecurePlatform NG FP3 and Red Hat 7.2.
SecurePlatform
SecurePlatform can be installed from a Serial Console, without the need to connect the keyboard to the installed computer itself.
Last Update August 15, 2002
Added support for several new NICs. For the full list of supported NICs please refer to http:// www.checkpoint.com/techsupport. SecurePlatform supports up to 1024 interfaces. Ability to patch from a CD, which allows a fast upgrade directly from the SecurePlatform CD. Upgrade patches from earlier versions are included. Kernel debug support allows booting in debug mode, so that kernel crashes can be debugged. The kernel creates a dump of the machine memory in cases of crashes.
SmartView Monitor
New monitoring of Counters for VPN-1, FireWall-1, FloodGate-1 and the operating system. Real Time Monitoring of different Check Point counters such as Tunnels, CPU usage and encrypted bytes. Multiple selection of counters from different categories. Detailed description of each counter is available on counter selection. Traffic and counter reports for the last hour, day and week. Provides an historical view of the last hour day and week of a selected subset of traffic views and Check Point counters. Toolbar option allows navigation between different time scales. Configurable file for history definitions. Monitor of top Services, IP Addresses and FireWall-1 rules. Allows a Real Time Monitor of the 1-50 top bandwidth consuming Services, IP addresses or FireWall-1 Rules. (The view dynamically changes its entities according to the current top entities). Up to 50 top items can be viewed. Disable Top view, allows the user to follow the current top entities without allowing new entities to enter the display. New table view with statistical info. Statistical columns which show the maximum, minimum and of the given value. Columns can be sorted. Highlighting the legend highlights the view and vice versa. Factor Optimizationnormalizes the counter value to the current view.
UserAuthority
Cross-server authentication in an organization with multiple Web Servers, users in the organization often find themselves having to reauthenticate time and time again. UserAuthority allows user information to be shared between Servers, thus a user authenticates once, and thereafter this authentication carries over to every other Web Server. This is in addition to and separate from users that were recognized from having authenticated via other mechanisms, such as VPN-1/FireWall-1 or the Domain Controller. Improved logging of UserAuthority Server. New and improved SSO Flow the SSO (Single Sign-On) Flow enables the user to enter the system once and thereafter to not have to reauthenticate at subsequent logons. For this purpose the user enters the system via the SignOn window (which allows you to sign on to the UserAuthority system) and Confirm window (which is an optional window that enables the user to
view, learn and manipulate the system automatically). These windows smooth and ease SSO flow. They appear limitedly throughout the working day; thereby enabling the user to transition smoothly and easily through the system. UserAuthority Settings a new Interface for users to handle their credentials to web application, UserAuthority Settings allows users to change/insert their passwords to applications and to handle their personal preferences. VPN-1/FireWall-1 Logs and Web Logs helps web administrators, security administrators and helpdesk administrators to handle all operations in UserAuthority WebAccess. A new log system was added to UserAuthority WebAccess, it allows administrators to configure the relevant events in which they are interested and to give them the ability to get the information through a web interface or the Check Point Log Viewer. Rules Exceptions It is possible to define a rule exception. An area is designated in the scope of the rules to which the rule does not apply. This makes it easier to define website permissions.
FloodGate-1
FloodGate-1 can run in Express mode. In this mode the performance of the products is greatly enhanced by the ability to choose a limited set of features. To activate Express mode, edit and install an Express QoS policy. FloodGate-1 Modules can be assigned dynamic IP Addresses and defined as DAIP Modules. FloodGate-1 files are now installed in a new default directory. A new environment variable that contains this path was introduced: FGDIR. In Linux, Nokia and Solaris platforms the directory is located: /opt/CPfg1-53/. In Windows platforms the directory is located: \program
files\checkpoint\fg1\ng\
A QoS rule can be marked as applicable only to VPN traffic. This is achieved by checking Apply rule only to encrypted traffic in the QoS Action window. QoS now has a new Install Policy window with enhanced functionality. The QoS Action window is used to determine the actions in a FloodGate-1 rule. This window now contains a Simple and an Advanced mode. FloodGate-1 now logs and accounts the following: Connections rejected by the admission policy (Per Connection Guarantee). Packet dropped on account of buffer saturation and Drop policy LLQ (Low Latency Queuing) drops. LLQ statistics. These statistics can be used to configure the Maximal Delay in LLQ. FloodGate-1 can be installed on cluster members in Load Sharing mode. Each cluster member is allocated bandwidth independently. Traffic distribution between cluster members ensures that there are no bandwidth allocation discrepancies. This is important because bandwidth allocation amongst cluster members is not synchronized. FloodGate-1 now supports more IP services. The new set includes all the IP services supported by FireWall-1. FloodGate-1 now supports Linux Red-Hat 7.3 (Kernel 2.4.18)
ROBO Gateways are managed in a new, simple and scalable ROBO Manager GUI. Simplified setup on account of automatic calculation of information on the ROBO Gateway such as Anti spoofing, Encryption Domain, as well as the resolution of dynamic objects such as LocalMachine, InternalNet, DMZNet and AuxiliaryNet. These dynamic objects represent the ROBO Gateway and the networks behind the interfaces. Central localization of policy per ROBO Gateway (by central resolution of Dynamic Objects per ROBO Gateway via the ROBO Manager GUI). Periodic Fetch of policy by the ROBO Gateway. Troubleshooting actions per ROBO Gateway via the ROBO Manager GUI such as Push Policy, CPStop/CPStart and Reboot. Light-weight status monitoring of all ROBO Gateways. In-Depth status monitoring of a ROBO Gateway per request. ROBO Gateways are regular Check Point Gateways which support security policy enforcement (and other FireWall-1 capabilities). ROBO Gateways support Static or Dynamic IP addresses. ROBO Gateways support Site-to-site VPN tunnels to a regular (Central-Office/CO) Gateway. Backconnections are also supported. ROBO Gateways support VPN Tunnels from SecuRemote clients. ROBO Gateways support sending logs to different Log Servers. A Provider-1 CMA with a SmartCenter Pro license can manage ROBO Gateways as a regular SmartCenter Pro Server.
Provider-1/SiteManager-1
In version NG FP2, the CMA memory usage was reduced to 10 to 20 MB per CMA (depending on the CMAs activity). In version NG FP3, these figures have been further reduced. Provider-1/SiteManager-1 allows Check Point logs to be easily exported to an external Oracle Database. The database can then be used to create any type of report with customer proprietary tools. The Log Export feature enables the administrator to schedule an export operation per CMA and to easily select the log fields to be exported. The feature is fully supported from the MDG. The System Status view has been restructured to a tabular format, clearly displaying the maximal amount of information. The display can be sorted, modified to show selected data, or exported to a file.
10