Ngx II r65 Slides

197
07 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential. pure securit Check Point Security Administration II NGX R65

Transcript of Ngx II r65 Slides

Page 1: Ngx II r65 Slides

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Check Point Security Administration IINGX R65

Page 2: Ngx II r65 Slides

2©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Slide Graphic LegendSlide Graphic Legend

Page 3: Ngx II r65 Slides

3©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Course ObjectivesCourse Objectives

Part 1: Updating and Upgrading Chapter 1: SmartUpdate

– Identify the common operational features of SmartUpdate.– Use SmartUpdate to create an upgrade package.– Upgrade and attach product licenses using SmartUpdate.

Chapter 2: Upgrading VPN-1– Determine which VPN-1 upgrade strategy is appropriate, given

a variety of scenarios.– Determine VPN-1 license requirements, based on upgrade

strategy.

Page 4: Ngx II r65 Slides

4©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Course ObjectivesCourse Objectives

Part 2: Virtual Private Networks Chapter 3: Encryption and VPNs

– Explain encryption for VPNs.– Compare and contrast common encryption methods.– Describe the process for setting up a encrypted VPN tunnels.

Chapter 4: Introduction to VPNs– Select the appropriate VPN deployment to meet requirements,

given a variety of scenarios.– Configure VPN-1 to support site-to-site VPNs, given a variety of

business requirements.– Adjust NGX R65 VPN configuration settings to correct a

problem, given symptoms of a configuration problem.

Page 5: Ngx II r65 Slides

5©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Course ObjectivesCourse Objectives

Chapter 5: Site-to-Site VPNs– Select the appropriate VPN deployment to meet requirements,

given a variety of scenarios.– Configure VPN-1 to support site-to-site VPNs, given a variety of

business requirements.– Adjust VPN configuration settings to correct a problem, given

symptoms of a configuration problem.

Chapter 6: Remote Access VPNs– Configure VPN-1 to support remote-access VPNs, given a

variety of business requirements.

Page 6: Ngx II r65 Slides

6©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Course ObjectivesCourse Objectives

Part 3: High Availability and ClusterXL Chapter 7: High Availability and ClusterXL

– Identify the features and limitations of Management High Availability.

– Identify the benefits and limitations of different modes in a ClusterXL configuration.

– Configure a ClusterXL VPN, given a specific business scenario.– Implement and test State Synchronization, given a business

scenario.

Page 7: Ngx II r65 Slides

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

PrefaceCheck Point Security Administration II

NGX (R65)

Page 8: Ngx II r65 Slides

8©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Course LayoutCourse Layout

Prerequisites Check Point Certified Security Expert (CCSE)

Page 9: Ngx II r65 Slides

9©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Recommended Setup for LabsRecommended Setup for Labs

Recommended Lab Topology

Page 10: Ngx II r65 Slides

10©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Recommended Setup for LabsRecommended Setup for Labs

IP Addresses Lab Terms

Page 11: Ngx II r65 Slides

11©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Check Point Security ArchitectureCheck Point Security Architecture

PURE Security

Page 12: Ngx II r65 Slides

12©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Check Point Security ArchitectureCheck Point Security Architecture

Check Point Components

Page 13: Ngx II r65 Slides

13©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Check Point Security ArchitectureCheck Point Security Architecture

Unified Security Architecture

Page 14: Ngx II r65 Slides

14©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Check Point Security ArchitectureCheck Point Security Architecture

Broad Range of Security Solutions

Page 15: Ngx II r65 Slides

15©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Check Point Security ArchitectureCheck Point Security Architecture

Network Security Data Security Security Management Services

Page 16: Ngx II r65 Slides

16©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Training and CertificationTraining and Certification

CCMA Learn More

Page 17: Ngx II r65 Slides

17©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Part 1: Updating and UpgradingPart 1: Updating and Upgrading

Chapter 1: SmartUpdate

Chapter 2: Upgrading VPN-1

Page 18: Ngx II r65 Slides

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

1

SmartUpdateSmartUpdate

Page 19: Ngx II r65 Slides

19©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

ObjectivesObjectives

Identify the common operational features of SmartUpdate.

Use SmartUpdate to create an upgrade package. Upgrade and attach product licenses using

SmartUpdate.

11

Page 20: Ngx II r65 Slides

20©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Introduction to SmartUpdateIntroduction to SmartUpdate

Optional component of VPN-1 that automatically distributes software applications and updates for Check Point and OPSEC certified products

Manages product licenses

11

Page 21: Ngx II r65 Slides

21©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Introduction to SmartUpdateIntroduction to SmartUpdate

SmartUpdate Architecture

11

Page 22: Ngx II r65 Slides

22©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Upgrading PackagesUpgrading Packages

Prerequisites for Remote Upgrades Retrieving Data From VPN-1 Gateways Adding New Packages to the Package Repository Verifying the Viability of a Distribution Transferring Files to Remote Devices Upgrading Edge Firmware with SmartUpdate Rebooting the VPN-1 Gateway Recovering From a Failed Upgrade Deleting Packages From the Package Repository

11

Page 23: Ngx II r65 Slides

23©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Managing LicensesManaging Licenses

Central license: package license tied to IP address of SmartCenter Server

Local license: package license tied to IP address of VPN-1 Gateway, and cannot be transferred to Gateway with different IP address

License Upgrade Retrieving License Data From VPN-1 Gateways CPInfo SmartUpdate Command Line

11

Page 24: Ngx II r65 Slides

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

1Updating an Installation with Updating an Installation with

SmartUpdateSmartUpdate

Page 25: Ngx II r65 Slides

25©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

1. What can be upgraded remotely using SmartUpdate?

11

Page 26: Ngx II r65 Slides

26©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

VPN-1 Gateways Hotfixes, HFAs, and patches Third-party OPSEC applications UTM Edge devices Nokia operating systems Check Point SecurePlatform

11

Page 27: Ngx II r65 Slides

27©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

2. What two repositories does SmartUpdate install on the SmartCenter Server?

11

Page 28: Ngx II r65 Slides

28©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

License & Contract Repository in $FWDIR\conf Package Repository in C:\SUroos (Windows),

/var/suroot (UNIX)

11

Page 29: Ngx II r65 Slides

29©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

3. What does the Pre-Install Verifier check?

11

Page 30: Ngx II r65 Slides

30©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

Operating-system compatibility Disk-space availability Package not already installed Package dependencies met

11

Page 31: Ngx II r65 Slides

31©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

4. What are the benefits of using a central license?

11

Page 32: Ngx II r65 Slides

32©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

Only one IP address is needed for all licenses. A license can be moved from one Gateway to another. A license remains valid when changing Gateway IP

addresses.

11

Page 33: Ngx II r65 Slides

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

2Upgrading VPN-1Upgrading VPN-1

Page 34: Ngx II r65 Slides

34©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

ObjectivesObjectives

Determine which VPN-1 upgrade strategy is appropriate, given a variety of scenarios.

Determine VPN-1 license requirements, based on upgrade strategy.

22

Page 35: Ngx II r65 Slides

35©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Preinstallation ConfigurationPreinstallation Configuration

– Remove any services not running that might be considered a security risk.

– Ensure your network and Gateway are properly configured, with special emphasis on routing.

– Log in to each of the hosts, and Ping the other hosts.– Enable IP routing/forwarding.– Confirm that DNS is working properly. – Note names/IP addresses of the Gateway’s interfaces.– Confirm Gateway’s name corresponds to IP address of

Gateway’s external interface.– Isolate the computers on which you will be installing VPN-1

components from the network.– Verify you have correct version of software for all VPN-1

components.

22

Page 36: Ngx II r65 Slides

36©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Distributed InstallationDistributed Installation

VPN-1 Client/Server Configuration

22

Page 37: Ngx II r65 Slides

37©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Upgrading To VPN-1 NGX R65Upgrading To VPN-1 NGX R65

Upgrade Guidelines Upgrade Order Upgrade Export/Import Upgrading via SmartUpdate

22

Page 38: Ngx II r65 Slides

38©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

VPN-1 Backward CompatibilityVPN-1 Backward Compatibility

Supported Versions

22

Page 39: Ngx II r65 Slides

39©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Licensing VPN-1Licensing VPN-1

Obtaining Licenses Supported Upgrade Paths Contract Verification

22

Page 40: Ngx II r65 Slides

40©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Performing License UpgradePerforming License Upgrade

Two Upgrade Methods Trial Licenses

22

Page 41: Ngx II r65 Slides

41©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Pre-Upgrade ConsiderationsPre-Upgrade Considerations

Pre-Upgrade Verification Tool Web Intelligence License Enforcement Upgrading on SecurePlatform

22

Page 42: Ngx II r65 Slides

42©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Upgrading SmartCenter ServerUpgrading SmartCenter Server

Using the Pre-Upgrade Verification Tool

22

Page 43: Ngx II r65 Slides

43©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Gateway UpgradeGateway Upgrade

Gateway Upgrade with SmartUpdate

22

Page 44: Ngx II r65 Slides

44©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

1. What is the correct order for a VPN-1 upgrade?

22

Page 45: Ngx II r65 Slides

45©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

SmartCenter Server first, then Security Gateway

22

Page 46: Ngx II r65 Slides

46©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

2. What should be done before installing a VPN-1 Security Gateway?

22

Page 47: Ngx II r65 Slides

47©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

– Remove any services not running that may be a security risk.– Make sure your network and Gateway are properly configured.– Test network communication.– Enable IP routing/forwarding– Confirm DNS is working properly.– Note the names and IP addresses of the Gateway’s interfaces.– Confirm the Gateway is shown in the hosts files correctly.– Isolate the computers.– Verify the correct version of software for you OS

22

Page 48: Ngx II r65 Slides

48©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

3. What methods are there for upgrading licenses?

22

Page 49: Ngx II r65 Slides

49©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

Centrally, from the SmartCenter Server via SmartUpdate

Locally at the Check Point machine

22

Page 50: Ngx II r65 Slides

50©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

4. Which products can be upgraded to NGX R65?

22

Page 51: Ngx II r65 Slides

51©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

– VPN-1 Pro Gateways– SecurePlatform– SmartView Monitor– Eventia Reporter– UserAuthority Server– Policy Server– Check Point QoS– Nokia OS– UTM-1

22

Page 52: Ngx II r65 Slides

52©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Part 2: Virtual Private NetworksPart 2: Virtual Private Networks

Chapter 3: Encryption and VPNs

Chapter 4: Introduction to VPNs

Chapter 5: Site-to-Site VPNs

Chapter 6: Remote Access VPNs

Page 53: Ngx II r65 Slides

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

3

Encryption and VPNsEncryption and VPNs

Page 54: Ngx II r65 Slides

54©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

ObjectivesObjectives

Explain encryption for VPNs. Compare and contrast common encryption methods. Describe the process for setting up a encrypted VPN

tunnels.

33

Page 55: Ngx II r65 Slides

55©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Securing CommunicationSecuring Communication

Privacy

33

Page 56: Ngx II r65 Slides

56©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Securing CommunicationSecuring Communication

Shared-Secret Key

33

Page 57: Ngx II r65 Slides

57©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Securing CommunicationSecuring Communication

Symmetric Encryption

33

Page 58: Ngx II r65 Slides

58©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Securing CommunicationSecuring Communication

Symmetric Disadvantages Asymmetric Encryption

33

Page 59: Ngx II r65 Slides

59©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Securing CommunicationSecuring Communication

Diffie-Hellman Encryption

33

Page 60: Ngx II r65 Slides

60©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Securing CommunicationSecuring Communication

Integrity– Hash Function

33

Page 61: Ngx II r65 Slides

61©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Securing CommunicationSecuring Communication

Authentication– Digital Signature

33

Page 62: Ngx II r65 Slides

62©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Securing CommunicationSecuring Communication

Two Phases of Encryption Encryption Algorithms

33

Page 63: Ngx II r65 Slides

63©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

IKEIKE

ISAKMP Oakley ISAKMP/Oakley Phase 1 Phase 2 IKE Example

33

Page 64: Ngx II r65 Slides

64©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

IKEIKE

Tunneling-Mode Encryption– Encrypted Packet

33

Page 65: Ngx II r65 Slides

65©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Certificate AuthoritiesCertificate Authorities

Certificates Multiple Certificate

Authorities Certificate Authority

Hierarchy

33

Page 66: Ngx II r65 Slides

66©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Certificate AuthoritiesCertificate Authorities

Local Certificate Authority

33

Page 67: Ngx II r65 Slides

67©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Certificate AuthoritiesCertificate Authorities

CA Service via the Internet

33

Page 68: Ngx II r65 Slides

68©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Certificate AuthoritiesCertificate Authorities

Internal Certificate Authority CA Public Keys

– CA Action

33

Page 69: Ngx II r65 Slides

69©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Certificate AuthoritiesCertificate Authorities

Creating Certificates

33

Page 70: Ngx II r65 Slides

70©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

1. What three tenets of network communication do Security Administrators need to ensure?

33

Page 71: Ngx II r65 Slides

71©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

Confidentiality — No one, other than the intended parties, can understand the communication.

Integrity — The sensitive data passed between the communicating parties is unchanged.

Authentication — The communicating parties must be sure they are connecting with the intended party.

33

Page 72: Ngx II r65 Slides

72©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

2. Which encryption system uses a different key for encryption and decryption?

33

Page 73: Ngx II r65 Slides

73©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

Asymmetric cryptographic systems

33

Page 74: Ngx II r65 Slides

74©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

3. What two modes does VPN-1 supply for IKE Phase 1 between Gateways?

33

Page 75: Ngx II r65 Slides

75©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

Main mode (default) Aggressive mode

33

Page 76: Ngx II r65 Slides

76©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

4. Which encryption method encapsulates an entire packet, adding its own encryption protocol header to the packet?

33

Page 77: Ngx II r65 Slides

77©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

Tunnel-mode encryption

33

Page 78: Ngx II r65 Slides

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

4Introduction to VPNsIntroduction to VPNs

Page 79: Ngx II r65 Slides

79©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

ObjectivesObjectives

Select the appropriate VPN deployment to meet requirements, given a variety of scenarios.

Configure VPN-1 to support site-to-site VPNs, given a variety of business requirements.

Adjust NGX R65 VPN configuration settings to correct a problem, given symptoms of a configuration problem.

44

Page 80: Ngx II r65 Slides

80©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

The Check Point VPNThe Check Point VPN

– Check Point VPN Topology

44

Page 81: Ngx II r65 Slides

81©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

The Check Point VPNThe Check Point VPN

Simplified VPN Tunnel

44

Page 82: Ngx II r65 Slides

82©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

The Check Point VPNThe Check Point VPN

How a VPN Works– Gateway-to-Gateway Network configuration

44

Page 83: Ngx II r65 Slides

83©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

The Check Point VPNThe Check Point VPN

Specifying Encryption

44

Page 84: Ngx II r65 Slides

84©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

VPN DeploymentsVPN Deployments

Site-to-Site VPNs

44

Page 85: Ngx II r65 Slides

85©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

VPN DeploymentsVPN Deployments

Remote-Access VPNs

44

Page 86: Ngx II r65 Slides

86©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

VPN ImplementationVPN Implementation

Three Critical VPN Components– Complete VPN

44

Page 87: Ngx II r65 Slides

87©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

VPN ImplementationVPN Implementation

VPN Setup– Two-Network Configuration

44

Page 88: Ngx II r65 Slides

88©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

VPN ImplementationVPN Implementation

How a VPN Works

44

Page 89: Ngx II r65 Slides

89©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

VPN ImplementationVPN Implementation

– VPN Tunnel

44

Page 90: Ngx II r65 Slides

90©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

VPN ImplementationVPN Implementation

VPN Communities

44

Page 91: Ngx II r65 Slides

91©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

VPN ImplementationVPN Implementation

VPN Topologies– Basic Meshed Community

44

Page 92: Ngx II r65 Slides

92©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

VPN ImplementationVPN Implementation

– Star VPN Community

44

Page 93: Ngx II r65 Slides

93©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

VPN ImplementationVPN Implementation

Choosing a Topology– Star and Mesh Combined

44

Page 94: Ngx II r65 Slides

94©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

VPN ImplementationVPN Implementation

– Different Encryptions in Mesh Communities

44

Page 95: Ngx II r65 Slides

95©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

VPN ImplementationVPN Implementation

– Special Condition

44

Page 96: Ngx II r65 Slides

96©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

VPN ImplementationVPN Implementation

– Three VPN Communities

44

Page 97: Ngx II r65 Slides

97©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

VPN ImplementationVPN Implementation

Authentication Between Community Members Dynamically Assigned IP Gateways Routing Traffic Within a VPN Community Access Control and VPN Communities

44

Page 98: Ngx II r65 Slides

98©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

VPN ImplementationVPN Implementation

– Access Control in VPN Communities

44

Page 99: Ngx II r65 Slides

99©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

VPN ImplementationVPN Implementation

Special Considerations for Planning a VPN Topology

44

Page 100: Ngx II r65 Slides

101©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

VPN ImplementationVPN Implementation

Integrating VPNs into a Rule Base

44

Page 101: Ngx II r65 Slides

102©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

1. What is a VPN Community?

44

Page 102: Ngx II r65 Slides

103©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

A collection of VPN enabled Gateways capable of communication via VPN tunnels

44

Page 103: Ngx II r65 Slides

104©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

2. What is a meshed VPN Community?

44

Page 104: Ngx II r65 Slides

105©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

A VPN Community in which a VPN site can create a VPN tunnel with any other VPN site within the Community

44

Page 105: Ngx II r65 Slides

106©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

3. Which is the preferred means of authentication between VPN Community members, and why?

44

Page 106: Ngx II r65 Slides

107©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

Certificates, because they are more secure than pre-shared secrets

44

Page 107: Ngx II r65 Slides

108©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

4. If both domain-based VPN and route-based VPN are configured, which will take precedence?

44

Page 108: Ngx II r65 Slides

109©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

Domain-based VPN

44

Page 109: Ngx II r65 Slides

110©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

5. When planning a VPN topology, what questions should be asked?

44

Page 110: Ngx II r65 Slides

111©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

Who needs secure/private access? From the point of view of the VPN, what will be the

structure of the organization? How will externally managed Gateways authenticate?

44

Page 111: Ngx II r65 Slides

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

5

Site-to-Site VPNsSite-to-Site VPNs

Page 112: Ngx II r65 Slides

113©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

ObjectivesObjectives

Select the appropriate VPN deployment to meet requirements, given a variety of scenarios.

Configure VPN-1 to support site-to-site VPNs, given a variety of business requirements.

Adjust VPN configuration settings to correct a problem, given symptoms of a configuration problem.

55

Page 113: Ngx II r65 Slides

114©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Site-to-Site VPNSite-to-Site VPN

Domain-Based VPN

55

Page 114: Ngx II r65 Slides

115©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Site-to-Site VPNSite-to-Site VPN

Simple VPN Routing

55

Page 115: Ngx II r65 Slides

116©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Site-to-Site VPNSite-to-Site VPN

Route-Based VPN VPN Routing Process for VTIs

55

Page 116: Ngx II r65 Slides

117©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Site-to-Site VPNSite-to-Site VPN

Routing to a Virtual Interface

55

Page 117: Ngx II r65 Slides

118©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Site-to-Site VPNSite-to-Site VPN

Route-Based VPN

55

Page 118: Ngx II r65 Slides

119©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Site-to-Site VPNSite-to-Site VPN

Routing Multicast Packets Through VPN Tunnels

55

Page 119: Ngx II r65 Slides

120©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Site-to-Site VPNSite-to-Site VPN

Multicasting

55

Page 120: Ngx II r65 Slides

121©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

VPN Tunnel ManagementVPN Tunnel Management

Permanent Tunnels

55

Page 121: Ngx II r65 Slides

122©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

VPN Tunnel ManagementVPN Tunnel Management

Permanent Tunnel in MEP Environment

55

Page 122: Ngx II r65 Slides

123©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

VPN Tunnel ManagementVPN Tunnel Management

VPN Tunnel Sharing

55

Page 123: Ngx II r65 Slides

124©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Wire ModeWire Mode

Wire Mode in a MEP Configuration

55

Page 124: Ngx II r65 Slides

125©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Wire ModeWire Mode

– Wire Mode in MEP

55

Page 125: Ngx II r65 Slides

126©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Wire ModeWire Mode

Wire Mode with Route-Based VPN– Wire Mode in a Satellite Community

55

Page 126: Ngx II r65 Slides

127©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Wire ModeWire Mode

Wire Mode Between Two VPN Communities

55

Page 127: Ngx II r65 Slides

128©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Directional VPN EnforcementDirectional VPN Enforcement

Directional Enforcement Between Communities

55

Page 128: Ngx II r65 Slides

129©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Directional VPN EnforcementDirectional VPN Enforcement

Directional Enforcement Within a Community

55

Page 129: Ngx II r65 Slides

130©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Directional VPN EnforcementDirectional VPN Enforcement

Directional Enforcement Between Communities– Directional VPN between Mesh and Star Communities

55

Page 130: Ngx II r65 Slides

131©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Multiple Entry Point VPNsMultiple Entry Point VPNs

VPN High Availability with MEP

55

Page 131: Ngx II r65 Slides

132©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Traditional Mode VPNsTraditional Mode VPNs

Organizations with large VPN deployments with complex networks may continue to work within Traditional Mode.

VPN Domains and Encryption Rules

55

Page 132: Ngx II r65 Slides

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

2Two-Gateway IKE EncryptionTwo-Gateway IKE Encryption

(Shared Secret)(Shared Secret)

Page 133: Ngx II r65 Slides

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

3Two-Gateway IKE Encryption

(Certificates)

Page 134: Ngx II r65 Slides

135©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

1. What type of VPN does the use of VPN tunnel interfaces support?

55

Page 135: Ngx II r65 Slides

136©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

Route-based VPNs

55

Page 136: Ngx II r65 Slides

137©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

2. What are the three types of VPN tunnel sharing supported by VPN-1?

55

Page 137: Ngx II r65 Slides

138©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

One VPN tunnel per each pair of hosts One VPN tunnel per subnet pair One VPN tunnel per Gateway pair

55

Page 138: Ngx II r65 Slides

139©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

3. What is the advantage of a Wire Mode VPN?

55

Page 139: Ngx II r65 Slides

140©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

Improves connectivity by allowing existing connections to fail over successfully by bypassing firewall enforcement, and relying on the security of the trusted VPN connection itself

55

Page 140: Ngx II r65 Slides

141©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

4. What are the primary benefits of Multiple Entry Point VPNs?

55

Page 141: Ngx II r65 Slides

142©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

High Availability Load Sharing

55

Page 142: Ngx II r65 Slides

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

6

Remote Access VPNsRemote Access VPNs

Page 143: Ngx II r65 Slides

144©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

ObjectivesObjectives

Configure VPN-1 to support remote-access VPNs, given a variety of business requirements.

66

Page 144: Ngx II r65 Slides

145©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Remote Access VPNRemote Access VPN

VPN-1 SecuRemote enables you to create a VPN tunnel between a remote user and your organization’s internal network.

Extending SecuRemote with SecureClient Connect Mode Establishing Remote Access — Workflow

66

Page 145: Ngx II r65 Slides

146©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Remote Access VPNRemote Access VPN

Workflow for Establishing Remote Access VPN

66

Page 146: Ngx II r65 Slides

147©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Office ModeOffice Mode

How Office Mode Works

66

Page 147: Ngx II r65 Slides

148©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Office ModeOffice Mode

– Office Mode Process

66

Page 148: Ngx II r65 Slides

149©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Office Mode PlanningOffice Mode Planning

IP Pool vs. DHCP Routing-Table Modifications Multiple External Interfaces Before Configuring Office Mode

66

Page 149: Ngx II r65 Slides

150©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Desktop Security PolicyDesktop Security Policy

Policy Expiration and Renewal Policy Server HA Wireless Hotspot/Hotel Registration Logging SecureClient Mobile

66

Page 150: Ngx II r65 Slides

151©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

VPN Routing — Remote AccessVPN Routing — Remote Access

VPN routing provides a way of controlling how VPN traffic is directed.

VPN routing can be implemented with Gateways and remote-access clients.

Configuration for VPN routing is performed either through SmartDashboard, or by editing routing-configuration files.

66

Page 151: Ngx II r65 Slides

152©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

VPN Routing — Remote AccessVPN Routing — Remote Access

– Simple VPN Routing

66

Page 152: Ngx II r65 Slides

153©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

VPN Routing — Remote AccessVPN Routing — Remote Access

Hub Mode

66

Page 153: Ngx II r65 Slides

154©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

SSL Network ExtenderSSL Network Extender

SSL Network Extender is connected to an SSL enabled Web server that is part of the Security Gateway.

SSL Network Extender It is via SmartDashboard. How SSL Network Extender Works Prerequisites

66

Page 154: Ngx II r65 Slides

155©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Clientless VPNClientless VPN

Clientless VPN provides secure SSL-based communication between clients and servers that support HTTPS.

Two phases:– Establishing a secure channel– Communication phase

66

Page 155: Ngx II r65 Slides

156©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Clientless VPNClientless VPN

– Communication Phase

66

Page 156: Ngx II r65 Slides

157©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Clientless VPNClientless VPN

Special Considerations for Clientless VPN Configuring Clientless VPN Creating Appropriate Rules in the Rule Base

66

Page 157: Ngx II r65 Slides

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

4Configuring Remote Access in an IKE

VPN

Page 158: Ngx II r65 Slides

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

5Using SecuRemote in an IKE VPN

Page 159: Ngx II r65 Slides

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

6Remote Access and Office Mode

Page 160: Ngx II r65 Slides

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

7SSL Network Extender

Page 161: Ngx II r65 Slides

162©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

1. When a SecuRemote/SecureClient needs to know the elements of the organization’s internal network to build a connection, how is that information sent?

66

Page 162: Ngx II r65 Slides

163©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

Over a connection secured and authenticated using IKE over SSL

66

Page 163: Ngx II r65 Slides

164©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

2. What is the most recommended and manageable method for client-Gateway authentication?

66

Page 164: Ngx II r65 Slides

165©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

Digital Certificates

66

Page 165: Ngx II r65 Slides

166©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

3. What problem does Office Mode solve?

66

Page 166: Ngx II r65 Slides

167©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

Nonroutable IP addresses; Office Mode enables a VPN-1 Gateway to assign a remote client an IP address.

66

Page 167: Ngx II r65 Slides

168©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

4. What is the advantage of SSL Network Extender

66

Page 168: Ngx II r65 Slides

169©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

Simple to implement, easy-to-use remote-access solution

66

Page 169: Ngx II r65 Slides

170©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Part 3: High AvailabilityPart 3: High Availability

Chapter 7: High Availability and ClusterXL

Page 170: Ngx II r65 Slides

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

7

High Availability and ClusterXLHigh Availability and ClusterXL

Page 171: Ngx II r65 Slides

172©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

ObjectivesObjectives

Identify the features and limitations of Management High Availability.

Identify the benefits and limitations of different modes in a ClusterXL configuration.

Configure a ClusterXL VPN, given a specific business scenario.

Implement and test State Synchronization, given a business scenario.

77

Page 172: Ngx II r65 Slides

173©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Management High AvailabilityManagement High Availability

– Management High Availability Deployment

77

Page 173: Ngx II r65 Slides

174©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Management High AvailabilityManagement High Availability

Management High Availability Environment Synchronization Status

77

Page 174: Ngx II r65 Slides

175©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Management High AvailabilityManagement High Availability

– Typical Management High Availability Example

77

Page 175: Ngx II r65 Slides

176©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

ClusterXLClusterXL

– VPN-1 Gateway Cluster

88

Page 176: Ngx II r65 Slides

177©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

ClusterXLClusterXL

Load Sharing

88

Page 177: Ngx II r65 Slides

178©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

ClusterXL ModesClusterXL Modes

Legacy High Availability Mode New High Availability Mode Load Sharing Multicast Mode Load Sharing Unicast (Pivot) Mode

88

Page 178: Ngx II r65 Slides

179©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

ClusterXL ModesClusterXL Modes

– Load Sharing Unicast Mode

88

Page 179: Ngx II r65 Slides

180©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

ClusterXL ModesClusterXL Modes

– Cluster Member Forwarding Packet

88

Page 180: Ngx II r65 Slides

181©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

ClusterXL ModesClusterXL Modes

Cluster Control Protocol

88

Page 181: Ngx II r65 Slides

182©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Synchronizing ClustersSynchronizing Clusters

The Synchronization Network How State Synchronization Works Synchronized-Cluster Restrictions

88

Page 182: Ngx II r65 Slides

183©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Sticky ConnectionsSticky Connections

The Sticky Decision Function

88

Page 183: Ngx II r65 Slides

184©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

cpha Commandscpha Commands

cphastart cphastop cphaprob cphaprob Syntax cphaprob Example fw hastat

88

Page 184: Ngx II r65 Slides

185©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Debugging ClusterXL IssuesDebugging ClusterXL Issues

fw ctl pstat Sync Output

88

Page 185: Ngx II r65 Slides

186©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

ClusterXL Configuration IssuesClusterXL Configuration Issues

Modes of ClusterXL Supporting SecureXL Crossover-Cable Support

88

Page 186: Ngx II r65 Slides

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

8Deploying New Mode HA

Page 187: Ngx II r65 Slides

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

9Load Sharing Unicast (Pivot) Mode

Page 188: Ngx II r65 Slides

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.

10Configuring Load Sharing Multicast

Mode (Optional)

Page 189: Ngx II r65 Slides

190©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

1. For Management HA to function properly, what data must be synchronized and backed up?

88

Page 190: Ngx II r65 Slides

192©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

2. In ClusterXL, what benefit does State Synchronization provide?

88

Page 191: Ngx II r65 Slides

193©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

Ensures no data is lost in case of a cluster member failure; all connection information and VPN state information is synchronized between the members.

88

Page 192: Ngx II r65 Slides

194©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

3. What does Load Sharing in Multicast Mode do?

88

Page 193: Ngx II r65 Slides

195©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

Enables you to distribute network traffic between cluster members

88

Page 194: Ngx II r65 Slides

196©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

4. In what two modes does State Synchronization work?

88

Page 195: Ngx II r65 Slides

197©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

Full sync, which transfers all VPN-1 kernel-table information from one cluster member to another

Delta sync, which transfers changes in the kernel tables between cluster members

88

Page 196: Ngx II r65 Slides

198©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

5. What is a “sticky” connection?

88

Page 197: Ngx II r65 Slides

199©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.puresecurity

Review Questions & AnswersReview Questions & Answers

When all of a connection’s packets are handled, in either direction, by a single cluster member

77