Foreword |
|
xxv | |
|
Introduction to Check Point Next Generation |
|
|
1 | (40) |
|
|
2 | (1) |
|
Introducing the Check Point Next Generation Suite of Products |
|
|
2 | (13) |
|
|
4 | (3) |
|
Account Management (LDAP) |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
9 | (2) |
|
Check Point High Availability (CPHA) |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
12 | (2) |
|
|
14 | (1) |
|
Understanding VPN-1/Fire Wall-1 SVN Components |
|
|
15 | (12) |
|
VPN-1/Fire Wall-1 Management Module |
|
|
16 | (1) |
|
Central Management ofVPN-1/Fire Wall-1 Modules |
|
|
16 | (4) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
22 | (4) |
|
|
26 | (1) |
|
|
27 | (1) |
|
Looking at Firewall Technology |
|
|
27 | (7) |
|
Proxy Server vs. Packet Filter |
|
|
28 | (1) |
|
Performance and Scalability |
|
|
29 | (1) |
|
FireWall-1's Inspection Engine |
|
|
30 | (2) |
|
Performance and Scalability |
|
|
32 | (2) |
|
|
34 | (2) |
|
|
36 | (3) |
|
Frequently Asked Questions |
|
|
39 | (2) |
|
Installing and Configuring VPN-1/FireWall-1 Next Generation |
|
|
41 | (100) |
|
|
42 | (1) |
|
|
42 | (18) |
|
|
44 | (1) |
|
|
45 | (1) |
|
|
46 | (3) |
|
Routing and Network Interfaces |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
51 | (1) |
|
Preparing for VPN-1/FireWall-1 NG |
|
|
52 | (5) |
|
|
57 | (1) |
|
|
58 | (1) |
|
Upgrading from a Previous Version |
|
|
59 | (1) |
|
Installing Check Point VPN-1/FireWall-1 NG on Windows |
|
|
60 | (28) |
|
|
60 | (12) |
|
Configuring Check Point VPN-1/FireWall-1 NG on Windows |
|
|
72 | (1) |
|
|
73 | (3) |
|
|
76 | (2) |
|
|
78 | (3) |
|
Certificate Authority Initialization |
|
|
81 | (2) |
|
|
83 | (2) |
|
Getting Back to Configuration |
|
|
85 | (3) |
|
Uninstalling Check Point VPN-1/FireWall-1 NG on Windows |
|
|
88 | (6) |
|
Unistalling VPN-1 & FireWall-1 |
|
|
88 | (3) |
|
Uninstalling SVN Foundation |
|
|
91 | (2) |
|
Uninstalling Management Clients |
|
|
93 | (1) |
|
Installing Check Point VPN-1/FireWall-1 NG on Solaris |
|
|
94 | (32) |
|
|
95 | (8) |
|
Configuring Check Point VPN-1/FireWall-1 NG on Solaris |
|
|
103 | (1) |
|
|
103 | (2) |
|
|
105 | (2) |
|
|
107 | (2) |
|
|
109 | (1) |
|
|
110 | (1) |
|
Certificate Authority Initialization |
|
|
111 | (1) |
|
|
112 | (4) |
|
Getting Back to Configuration |
|
|
116 | (2) |
|
Uninstalling VPN-1 & Fire Wall-1 |
|
|
118 | (4) |
|
Uninstalling SVN Foundation |
|
|
122 | (3) |
|
Uninstalling Management Clients |
|
|
125 | (1) |
|
Installing Check Point VPN-1/FireWall-1 NG on Nokia |
|
|
126 | (9) |
|
Installing the VPN-1/FireWall-1 NG Package |
|
|
127 | (1) |
|
|
128 | (1) |
|
Installing VPN-1/FireWall-1 NG |
|
|
129 | (3) |
|
Configuring VPN-1/FireWall-1 NG on Nokia |
|
|
132 | (3) |
|
|
135 | (1) |
|
|
136 | (3) |
|
Frequently Asked Questions |
|
|
139 | (2) |
|
Using the Graphical Interface |
|
|
141 | (50) |
|
|
142 | (1) |
|
|
142 | (29) |
|
|
144 | (1) |
|
|
145 | (3) |
|
|
148 | (1) |
|
|
149 | (1) |
|
|
150 | (2) |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
154 | (2) |
|
|
156 | (1) |
|
|
156 | (1) |
|
|
157 | (2) |
|
|
159 | (1) |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
161 | (1) |
|
|
161 | (2) |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
164 | (1) |
|
|
165 | (1) |
|
|
165 | (1) |
|
|
165 | (1) |
|
|
165 | (1) |
|
|
165 | (1) |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
168 | (1) |
|
|
168 | (1) |
|
|
169 | (1) |
|
|
169 | (1) |
|
|
170 | (1) |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
171 | (1) |
|
|
171 | (4) |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
173 | (1) |
|
|
173 | (1) |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
175 | (6) |
|
|
175 | (2) |
|
|
177 | (1) |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
179 | (1) |
|
|
179 | (1) |
|
|
179 | (1) |
|
|
179 | (1) |
|
Gateway High Availability |
|
|
179 | (1) |
|
Management High Availability |
|
|
179 | (1) |
|
|
180 | (1) |
|
|
180 | (1) |
|
Network Address Translation |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
181 | (2) |
|
|
183 | (3) |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
187 | (1) |
|
|
187 | (2) |
|
Frequently Asked Questions |
|
|
189 | (2) |
|
Creating a Security Policy |
|
|
191 | (38) |
|
|
192 | (1) |
|
Reasons for a Security Policy |
|
|
192 | (1) |
|
How to Write a Security Policy |
|
|
193 | (9) |
|
|
196 | (1) |
|
|
197 | (1) |
|
|
197 | (2) |
|
|
199 | (1) |
|
|
199 | (1) |
|
|
200 | (1) |
|
|
200 | (1) |
|
|
201 | (1) |
|
|
201 | (1) |
|
Modifications or Exceptions |
|
|
202 | (1) |
|
Implementing a Security Policy |
|
|
202 | (18) |
|
Default and Initial Policies |
|
|
202 | (1) |
|
Translating Your Policy into Rules |
|
|
203 | (2) |
|
Defining A Firewall Object |
|
|
205 | (6) |
|
|
211 | (4) |
|
|
215 | (1) |
|
|
215 | (1) |
|
|
215 | (1) |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
217 | (1) |
|
|
217 | (1) |
|
|
218 | (1) |
|
|
218 | (1) |
|
|
218 | (1) |
|
|
219 | (1) |
|
|
219 | (1) |
|
|
219 | (1) |
|
|
219 | (1) |
|
Management High Availability |
|
|
220 | (1) |
|
Installing a Security Policy |
|
|
220 | (1) |
|
|
221 | (2) |
|
|
223 | (1) |
|
|
223 | (3) |
|
Frequently Asked Questions |
|
|
226 | (3) |
|
Applying Network Address Translation |
|
|
229 | (26) |
|
|
230 | (1) |
|
|
230 | (6) |
|
|
234 | (2) |
|
Configuring Static Address Translation |
|
|
236 | (6) |
|
|
236 | (3) |
|
|
239 | (2) |
|
|
241 | (1) |
|
|
242 | (5) |
|
|
243 | (1) |
|
|
244 | (1) |
|
|
245 | (1) |
|
|
246 | (1) |
|
|
247 | (2) |
|
|
249 | (1) |
|
|
249 | (2) |
|
Frequently Asked Questions |
|
|
251 | (4) |
|
|
255 | (52) |
|
|
256 | (1) |
|
FireWall-1 Authentication Schemes |
|
|
256 | (8) |
|
|
257 | (1) |
|
|
258 | (1) |
|
|
258 | (1) |
|
VPN-1 & FireWall-1 Password |
|
|
259 | (1) |
|
|
260 | (1) |
|
|
261 | (2) |
|
|
263 | (1) |
|
|
264 | (5) |
|
|
264 | (1) |
|
Creating and Using Templates |
|
|
265 | (3) |
|
|
268 | (1) |
|
|
269 | (6) |
|
|
275 | (7) |
|
Client Authentication versus User Authentication |
|
|
282 | (1) |
|
|
282 | (7) |
|
Session Authentication versus Client and User Authentication |
|
|
288 | (1) |
|
|
289 | (12) |
|
|
291 | (3) |
|
|
294 | (1) |
|
|
294 | (1) |
|
|
295 | (6) |
|
|
301 | (1) |
|
|
302 | (2) |
|
Frequently Asked Questions |
|
|
304 | (3) |
|
Open Security (OPSEC) and Content Filtering |
|
|
307 | (46) |
|
|
308 | (1) |
|
|
308 | (2) |
|
Content Vectoring Protocol (CVP) |
|
|
310 | (8) |
|
|
310 | (1) |
|
|
311 | (3) |
|
Using the Resource in a Rule |
|
|
314 | (2) |
|
|
316 | (2) |
|
URI Filtering Protocol (UFP) |
|
|
318 | (6) |
|
|
318 | (2) |
|
Creating a URI Resource to Use UFP |
|
|
320 | (3) |
|
Using the Resource in a Rule |
|
|
323 | (1) |
|
|
324 | (1) |
|
Application Monitoring (AMON) |
|
|
324 | (2) |
|
Client Side OPSEC Applications |
|
|
326 | (2) |
|
|
326 | (1) |
|
|
326 | (1) |
|
Suspicious Activities Monitoring |
|
|
327 | (1) |
|
Object Management Interface |
|
|
327 | (1) |
|
Check Point Management Interface |
|
|
328 | (1) |
|
|
328 | (1) |
|
|
328 | (16) |
|
|
329 | (1) |
|
|
330 | (2) |
|
|
332 | (4) |
|
|
336 | (4) |
|
|
340 | (1) |
|
|
341 | (3) |
|
|
344 | (1) |
|
|
345 | (4) |
|
Frequently Asked Questions |
|
|
349 | (4) |
|
Managing Policies and Logs |
|
|
353 | (40) |
|
|
354 | (1) |
|
Administering Check Point VPN-1/FireWall-1 NG for Performance |
|
|
355 | (13) |
|
Configuring NG for Performance |
|
|
355 | (3) |
|
Administering NG for Performance |
|
|
358 | (5) |
|
Monitoring NG for Performance |
|
|
363 | (4) |
|
|
367 | (1) |
|
|
368 | (1) |
|
Administering Check Point VPN-1/FireWall-1 NG for Effectiveness |
|
|
368 | (12) |
|
|
368 | (2) |
|
|
370 | (1) |
|
|
371 | (1) |
|
Managing Multiple Policies |
|
|
372 | (1) |
|
|
373 | (2) |
|
|
375 | (1) |
|
|
376 | (4) |
|
|
380 | (1) |
|
Administering Check Point VPN-1/FireWall-1 NG for Recoverability |
|
|
380 | (2) |
|
|
380 | (2) |
|
Performing Advanced Administration Tasks |
|
|
382 | (6) |
|
|
382 | (1) |
|
|
382 | (1) |
|
|
382 | (1) |
|
|
383 | (1) |
|
|
383 | (1) |
|
|
383 | (1) |
|
|
383 | (1) |
|
|
383 | (2) |
|
|
385 | (1) |
|
|
385 | (1) |
|
|
386 | (1) |
|
|
386 | (1) |
|
|
386 | (1) |
|
|
386 | (1) |
|
|
387 | (1) |
|
|
387 | (1) |
|
|
387 | (1) |
|
|
387 | (1) |
|
|
387 | (1) |
|
|
387 | (1) |
|
|
387 | (1) |
|
|
387 | (1) |
|
|
387 | (1) |
|
|
388 | (1) |
|
|
388 | (2) |
|
Frequently Asked Questions |
|
|
390 | (3) |
|
|
393 | (22) |
|
|
394 | (1) |
|
|
394 | (5) |
|
|
395 | (1) |
|
|
396 | (1) |
|
|
396 | (1) |
|
|
397 | (2) |
|
|
399 | (4) |
|
|
400 | (1) |
|
Advanced User-Defined Alerts |
|
|
400 | (3) |
|
Suspicious Activities Monitoring (SAM) |
|
|
403 | (3) |
|
Check Point Malicious Activity Detection (CPMAD) |
|
|
406 | (6) |
|
|
408 | (1) |
|
|
408 | (2) |
|
|
410 | (2) |
|
|
412 | (1) |
|
|
412 | (2) |
|
Frequently Asked Questions |
|
|
414 | (1) |
|
Configuring Virtual Private Networks |
|
|
415 | (36) |
|
|
416 | (1) |
|
|
416 | (6) |
|
Encryption Algorithms; Symmetric vs. Asymmetric Cryptography |
|
|
417 | (2) |
|
Key Exchange Methods: Tunneling vs. In-Place Encryption |
|
|
419 | (1) |
|
Hash Functions and Digital Signatures |
|
|
420 | (1) |
|
Certificates and Certificate Authorities |
|
|
421 | (1) |
|
|
421 | (1) |
|
|
422 | (1) |
|
|
422 | (5) |
|
|
423 | (1) |
|
|
423 | (1) |
|
|
423 | (2) |
|
|
425 | (2) |
|
|
427 | (1) |
|
|
427 | (8) |
|
|
428 | (1) |
|
|
428 | (1) |
|
|
429 | (1) |
|
|
430 | (2) |
|
|
432 | (1) |
|
|
433 | (2) |
|
Considerations for External Networks |
|
|
435 | (1) |
|
Configuring a SecuRemote VPN |
|
|
435 | (5) |
|
|
436 | (1) |
|
User Encryption Properties |
|
|
436 | (1) |
|
|
437 | (1) |
|
|
437 | (2) |
|
|
439 | (1) |
|
Installing SecuRemote Client Software |
|
|
440 | (2) |
|
Using SecuRemote Client Software |
|
|
442 | (5) |
|
Secure Domain Login (SDL) |
|
|
445 | (2) |
|
|
447 | (1) |
|
|
447 | (2) |
|
Frequently Asked Questions |
|
|
449 | (2) |
|
|
451 | (28) |
|
|
452 | (1) |
|
Installing and Configuring a Policy Server |
|
|
452 | (3) |
|
|
453 | (1) |
|
Configuring a Policy Server |
|
|
454 | (1) |
|
|
455 | (8) |
|
|
455 | (3) |
|
Desktop Security Global Properties |
|
|
458 | (1) |
|
Desktop Configuration Verification |
|
|
459 | (1) |
|
Early Versions Compatibility |
|
|
460 | (1) |
|
|
461 | (2) |
|
Installing SecureClient Software |
|
|
463 | (10) |
|
SecureClient Packaging Tool |
|
|
465 | (8) |
|
Logging into the Policy Server |
|
|
473 | (2) |
|
|
475 | (1) |
|
|
475 | (2) |
|
Frequently Asked Questions |
|
|
477 | (2) |
|
|
479 | (32) |
|
|
480 | (1) |
|
Check Point High Availability (CPHA) |
|
|
480 | (8) |
|
Enabling High Availability |
|
|
481 | (3) |
|
|
484 | (2) |
|
|
486 | (2) |
|
Single Entry Point VPN Configurations (SEP) |
|
|
488 | (7) |
|
|
489 | (6) |
|
|
495 | (1) |
|
Multiple Entry Point VPN Configurations (MEP) |
|
|
495 | (9) |
|
|
496 | (3) |
|
|
499 | (2) |
|
|
501 | (3) |
|
Other High Availability Methods |
|
|
504 | (3) |
|
|
505 | (1) |
|
|
505 | (2) |
|
|
507 | (1) |
|
|
507 | (1) |
|
Frequently Asked Questions |
|
|
508 | (3) |
Appendix A Class C Subnet Mask Cheat Sheet |
|
511 | (8) |
Appendix B Spoofing: Attacks on Trusted Identity |
|
519 | (84) |
|
|
520 | (1) |
|
|
520 | (5) |
|
Spoofing Is Identity Forgery |
|
|
520 | (1) |
|
Spoofing Is an Active Attack against Identity Checking Procedures |
|
|
521 | (1) |
|
Spoofing Is Possible at All Layers of Communication |
|
|
521 | (1) |
|
Spoofing Is Always Intentional |
|
|
522 | (1) |
|
Spoofing May Be Blind or Informed, but Usually Involved Only Partial Credentials |
|
|
523 | (1) |
|
Spoofing Is Not the Same Thing as Betrayal |
|
|
524 | (1) |
|
Spoofing Is Not Necessarily Malicious |
|
|
524 | (1) |
|
|
525 | (1) |
|
|
525 | (2) |
|
The Importance of Identity |
|
|
526 | (1) |
|
|
527 | (2) |
|
Asymmetric Signatures between Human Beings |
|
|
527 | (2) |
|
Establishing Identity within Computer Networks |
|
|
529 | (4) |
|
|
530 | (1) |
|
In the Beginning, There Was...a Transmission |
|
|
531 | (2) |
|
|
533 | (14) |
|
Ability to Transmit: ``Can It Talk to Me?'' |
|
|
533 | (2) |
|
Ability to Respond: ``Can It Respond to Me?'' |
|
|
535 | (4) |
|
Ability to Encode: ``Can It Speak My Language?'' |
|
|
539 | (2) |
|
Ability to Prove a Shared Secret: ``Does It Share a Secret with Me?'' |
|
|
541 | (2) |
|
Ability to Prove a Private Keypair: ``Can I Recognize Your Voice?'' |
|
|
543 | (1) |
|
Ability to Prove an Identity Keypair: ``Is Its Identity Independently Represented in My Keypair?'' |
|
|
544 | (2) |
|
Configuration Methodologies: Building a Trusted Capability Index |
|
|
546 | (1) |
|
Local Configuratios vs. Central Configurations |
|
|
546 | (1) |
|
|
547 | (2) |
|
The Plague of Auto-Updating Applications |
|
|
547 | (2) |
|
|
549 | (13) |
|
Subtle Spoofs and Economic Sabotage |
|
|
550 | (1) |
|
Flattery Will Get You Nowhere |
|
|
550 | (2) |
|
Subtlety Will Get You Everywhere |
|
|
552 | (1) |
|
Selective Failure for Selecting Recovery |
|
|
552 | (2) |
|
Bait and Switch: Spoofing the Presence of SSL Itself |
|
|
554 | (8) |
|
Down and Dirty: Engineering Spoofing Systems |
|
|
562 | (32) |
|
Spitting into the Wind: Building a Skeleton Router in Userspace |
|
|
562 | (1) |
|
Designing the Nonexistent: The Network Card That Didn't Exist but Responded Anyway |
|
|
563 | (1) |
|
Implementation: DoxRoute, Section by Section |
|
|
564 | (22) |
|
Bring Out the Halon: Spoofing Connectivity Through Asymmetric Firewalls |
|
|
586 | (1) |
|
Symmetric Outgoing TCP: A Highly Experimental Framework for Handshake-Only TCP Connection Brokering |
|
|
587 | (7) |
|
|
594 | (1) |
|
|
595 | (4) |
|
Frequently Asked Questions |
|
|
599 | (4) |
Index |
|
603 | |