SlideShare a Scribd company logo
Security- Checkpoint
NetworKraft Consultancy
Why Checkpoint?
• Specialized Vendor
– Only Firewall Creators
• More Granularity
– Connection based Granularity
• More Open
– Multiple hardware platforms
– Multiple OS platforms for Management Server
Why Checkpoint?
• Better management tools
– SMARTConsole
• Simpler GUI
– More User friendly GUI (My view)
– Easy to troubleshoot
• No java incompatibility issue
– ASA faces this more often
Where Checkpoint?
• Everywhere… mostly in enterprise where there are
– Multiple DMZ zones
– Web servers
– Variety of applications
– Numerous client requirements
SMART Architecture
• Check Point Three-Tier Architecture
– SmartConsole  Client on the admin machine
– SmartCenter Server  Security Management Server
– Security Gateway  Enforcement Unit  The real FW
Deployment
• Stand-alone Deployment
– Secure Platform + Management Server  Enforcement Unit
– Client Software on Client Machine
• Distributed Deployment
– Secure Platform  Enforcement Module
– Management Server  Another Hardware
– Client Software on Client Machine
Deployment
Distributed Deployment:
Stand-Alone Deployment:
Security
Gateway
(Physical
Hardware)
Security
Mgmt
Server
Security
Smartview
Tracker
Security
Gateway
(Physical
Hardware) +
Security Mgmt
Server
Security
Smartview
Tracker
Traffic Control Methods
• Packet Filtering
– Specific Rules for Allowing/Denying Traffic
– Explicit Deny at the end of the policy
• Stateful Filtering
– Maintaining state table
– Makes environment more secured
– Stale out old entries to protect FW from running out of memory space
• Application Aware Filtering
– More granular
– Datagram inspection
Secure Platform
• IPSO: FreeBSD
– Ipsilon company  1997  NOKIA acquired  2009  Check Point acquired NOKIA
Security Appliances
• Secured Platform (SPLAT)
• GAIA: FreeBSD
– Same command line as in IPSO
– Beginning of Virtualization (Virtual System eXtension)
– More concurrent connections (210 million)
Real World of Check Point
• Network Design from FW point of view
• Installing GAiA OS using Image
• Basic configuration of Check Point Enforcement Module using
GUI (GAiA)
• Adding Security Gateway to Management Server using R77
DashBoard
Design
Tire X
Metal
X
YOUR
NETWORK-DC
(Ferrari)
Internet
Design- iDMZ and xDMZ
Internet
Internal Network
idmz xdmz
Why Distributed Deployment
• Installing Policy simultaneously in Multiple FW
• Easy to manage similar Firewalls
• What if two different purpose FW are in same Management
Server
– Policy Package
Features
• Anti-spoofing
• Anti-bot
• Identity Awareness
Lab Topology
Internet192.168.10.4
.2
.3
.5 192.168.1.1
.40
.30
.20
.7
GAiA
• Interface configuration
• Routing
– Static
– Dynamic (RIP,OSPF)
• System Management
– Proxy Server
– Core dump
– System Logging
GAiA Continued…
• High Availability
-VRRP (Virtual Router Redundancy Protocol)
• User Management
• Back-up/Restore
• Upgrade and licensing
Checkpoint SmartConsole
• Adding Rules in Firewalls
• Adding NAT rules in Firewall
• Policy package
• Network Monitoring
Important Commands
• Cpinfo  show tech-support (Cisco)
• Set interface eth0 ipv4 address192.168.10.1 subnet-mask 255.255.255.0
• Show interfaces all
• Fw stat
• Fw unloadlocal
• Fw monitor
Check Point Installation
- Start Virtual Machine
- Select Install Gaia on this system
Check Point Installation
Check Point Installation
Checking HCL
Check Point Installation
- Check Machine Info (Opt)
- Select OK
Check Point Installation
Select the Keyboard type
Check Point Installation
- Partition Configuration
- View/Change
- OK
Check Point Installation
- Type in the password
- Use this password
while logging in
through Gaia
Check Point Installation
- Select the interface
- Recheck (Opt)
Check Point Installation
- Give IP address to eth0
- Netmask
- Default Gateway
- This is the IP using
which we can login the
Gaia
Check Point Installation
Check Point Installation
Check Point Installation
Check Point Installation
Check Point Installation
Check Point Installation
- Reboot
Check Point Configuration
- Enter User Name and Password
Check Point Configuration
- Entering Gaia
Best Practices
• Adding a Stealth Rule (relatively above most of the rules)
– Deny Access to FW
– Add access rule above for management IP(s) to allow access
• Drop Noisy Traffic
– Bootp, bootps, sstp, UPMP etc. are rarely used protocols
• Add Drop Rule at the bottom of the List
– Drop Everything else!
Some Other Best Practices
• By default DNS, RIP and ICMP are unrestricted…Block them!
– Trojans such as BackOrafice use port 53/UDP (DNS)
– ICMP is used in Traceroute and Ping
– Man in the middle and DoS is possible with Poisoned RIP
• Maintain your FW
– Check for updates as new vulnerabilities are always discovered
• Know your Network
– Understand the requirement and place the FW
– Don’t place it where you need to allow almost everything
• Add only Specific Rules
…and a few more
• Relevant and consistence FW and Object Naming.
• Use Group management- Policy Packaging and Section creation.
• Use comments while making changes to existing config and rule base.
• Take Regular Backups of config and Rules
• Generate an alert in your management systems (HPoV) for monitoring FW
environment.t and regular backup procedures

More Related Content

PDF
CheckPoint Firewall Presentation CCSA.pdf
PPTX
F5 LTM TROUBLESHOOTING Guide latest.pptx
PDF
ASA Firepower NGFW Update and Deployment Scenarios
PPTX
Big ip f5 ltm load balancing methods
PPTX
Ccna sv2 instructor_ppt_ch3
PDF
Palo alto networks product overview
PPT
Next generation firewall(ngfw)feature and benefits
PPTX
CCSA Treinamento_CheckPoint.pptx
CheckPoint Firewall Presentation CCSA.pdf
F5 LTM TROUBLESHOOTING Guide latest.pptx
ASA Firepower NGFW Update and Deployment Scenarios
Big ip f5 ltm load balancing methods
Ccna sv2 instructor_ppt_ch3
Palo alto networks product overview
Next generation firewall(ngfw)feature and benefits
CCSA Treinamento_CheckPoint.pptx

What's hot (20)

PPTX
Checkpoint Firewall Training | Checkpoint Firewall Online Course
PPTX
Check Point NGFW
PPTX
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
PDF
Aruba Networks - Overview ClearPass
PPT
checkpoint
PDF
PNETLab.pdf
PDF
Kablosuz Ağlarda Güvenlik
PPT
Fortigate Training
PPTX
Transform your enterprise branch with secure sd-wan
PPTX
Adopting A Zero-Trust Model. Google Did It, Can You?
PPT
Fortinet FortiOS 5 Presentation
ODP
Introduction to Red Hat
PDF
MikroTik Security
PDF
Fortinet security fabric
PDF
CompTIA IT Skills Presentation
PPTX
The Data Center Network Evolution
PDF
Kali ile Linux'e Giriş | IntelRAD
PDF
Cisco Digital Network Architecture - Introducing the Network Intuitive
PPTX
F5 Solutions for Service Providers
PDF
ClearPass Overview
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Check Point NGFW
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
Aruba Networks - Overview ClearPass
checkpoint
PNETLab.pdf
Kablosuz Ağlarda Güvenlik
Fortigate Training
Transform your enterprise branch with secure sd-wan
Adopting A Zero-Trust Model. Google Did It, Can You?
Fortinet FortiOS 5 Presentation
Introduction to Red Hat
MikroTik Security
Fortinet security fabric
CompTIA IT Skills Presentation
The Data Center Network Evolution
Kali ile Linux'e Giriş | IntelRAD
Cisco Digital Network Architecture - Introducing the Network Intuitive
F5 Solutions for Service Providers
ClearPass Overview
Ad

Similar to Checkpoint Firewall for Dummies (20)

PPTX
Mastering checkpoint-1-basic-installation
PPTX
Perfect Foundation for 2013 Security Blueprint
PDF
Cp r75.40 release_notes
PPTX
NagiOs.pptxhjkgfddssddfccgghuikjhgvccvvhjj
PPTX
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
PPT
Power Grid Communications & Control Systems
PPT
Control system including PLC cybersecurity
PPTX
Nebulas Solutions Group | R75 Event
PPTX
Nagios Conference 2014 - Anna-Sofia Lejman - The Experience of Inheriting a N...
PDF
Don't Get Hacked on Hostile WiFi
PDF
CPX 2016 Moti Sagey Security Vendor Landscape
PDF
CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdf
PPT
I C S J W G San Antonio
PDF
Recover Multi-Vendor Network Infrastructure in minutes
PPTX
501 ch 9 implementing controls to protect assets
PDF
Ansaldo STS at CPExpo 2013: "Risks and Security Management in Logistics and ...
PDF
Cyber Security in Railways Systems, Ansaldo STS experience
PDF
PLNOG 8: Merike Kaeo - Guide to Building Secure Infrastructures
PDF
Are you ready for the next attack? Reviewing the SP Security Checklist
PPTX
Fiware testbed from hardware to openstack
Mastering checkpoint-1-basic-installation
Perfect Foundation for 2013 Security Blueprint
Cp r75.40 release_notes
NagiOs.pptxhjkgfddssddfccgghuikjhgvccvvhjj
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
Power Grid Communications & Control Systems
Control system including PLC cybersecurity
Nebulas Solutions Group | R75 Event
Nagios Conference 2014 - Anna-Sofia Lejman - The Experience of Inheriting a N...
Don't Get Hacked on Hostile WiFi
CPX 2016 Moti Sagey Security Vendor Landscape
CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdf
I C S J W G San Antonio
Recover Multi-Vendor Network Infrastructure in minutes
501 ch 9 implementing controls to protect assets
Ansaldo STS at CPExpo 2013: "Risks and Security Management in Logistics and ...
Cyber Security in Railways Systems, Ansaldo STS experience
PLNOG 8: Merike Kaeo - Guide to Building Secure Infrastructures
Are you ready for the next attack? Reviewing the SP Security Checklist
Fiware testbed from hardware to openstack
Ad

Recently uploaded (20)

PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PPTX
Introduction to Information and Communication Technology
PPTX
Database Information System - Management Information System
DOCX
Unit-3 cyber security network security of internet system
PDF
Paper PDF World Game (s) Great Redesign.pdf
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
Funds Management Learning Material for Beg
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PPTX
newyork.pptxirantrafgshenepalchinachinane
PPT
Ethics in Information System - Management Information System
PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPTX
SAP Ariba Sourcing PPT for learning material
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PDF
Introduction to the IoT system, how the IoT system works
PPTX
presentation_pfe-universite-molay-seltan.pptx
PPTX
Introduction to cybersecurity and digital nettiquette
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
Introduction to Information and Communication Technology
Database Information System - Management Information System
Unit-3 cyber security network security of internet system
Paper PDF World Game (s) Great Redesign.pdf
Unit-1 introduction to cyber security discuss about how to secure a system
Funds Management Learning Material for Beg
Slides PDF The World Game (s) Eco Economic Epochs.pdf
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
Job_Card_System_Styled_lorem_ipsum_.pptx
newyork.pptxirantrafgshenepalchinachinane
Ethics in Information System - Management Information System
Sims 4 Historia para lo sims 4 para jugar
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
SAP Ariba Sourcing PPT for learning material
Design_with_Watersergyerge45hrbgre4top (1).ppt
Introduction to the IoT system, how the IoT system works
presentation_pfe-universite-molay-seltan.pptx
Introduction to cybersecurity and digital nettiquette
INTERNET------BASICS-------UPDATED PPT PRESENTATION

Checkpoint Firewall for Dummies