R80 SECURITY
MANAGEMENT LAB
R80 Training
Updated Nov. 5, 2020 ©2020 Check Point Software Technologies Ltd. 1
• We’ve created a policy that reduces risk
for our organization and employees and
controls and educates our users on safe
Internet use.
• We’ve also discussed some security best
practices.
• In this lab we’ll explore ways to optimize
our policy using R80 security management
layers.
©2020 Check Point Software Technologies Ltd. 2
R80 Security Management Lab
Policy Review
At a high level our policy:
Inbound from the Internet
Blocks all (clean up rule 13)
Outbound to the Internet
Blacklists access to risky sites from the 192.168.101.0 network (rules 4 - 10)
Allows all else from the 192.168.101.0 network (rule 11)
Allows all from the 192.168.102.0 network (rule 12)
Internal
Allows all between the Internal zone and the DMZ (rule 11 and rule 12)
©2020 Check Point Software Technologies Ltd. 3
R80 Security Management Lab
Policy Review
What if we want to download EXE files from the DMZ? Does our policy allow
it?
The Destination of Any in rule 9 will block it. This may be difficult to see in a
complex policy with multiple sections and lots of rules.
In the rule search bar, search for EXE and only the rules matching the search
are shown with the search object highlighted.
Click x to delete the query. Notice that you can also search by token like
Action:Drop or packet. Click ? to learn more about the search options.
Packet Mode matches rules in the same way a packet with an IP address
arriving at the gateway would.
©2020 Check Point Software Technologies Ltd. 4
R80 Security Management Lab
Policy Review
Our intent for rules 4 – 10 is to control access to the Internet and not the
DMZ. There are a number of ways to fix this.
Click + in the Destination column of rule 4.
Type internet and we see two options (add both)
All Internet address range (0.0.0.0 to 255.255.255.255)
Internet object (double click to open, click ? for more info)
Notice both include traffic to the DMZ. Not what we want.
©2020 Check Point Software Technologies Ltd. 5
R80 Security Management Lab
Policy Review
Right click to remove both Internet objects.
We have more options.
Add the Net_192.168.102.0 network object to the rule 4 destination column,
then right click and select Negate Cell.
In our simple 3 legged network this works, but requires 14 steps to add to
rules 4 – 10.
©2020 Check Point Software Technologies Ltd. 6
R80 Security Management Lab
Policy Review
Right click to remove the Net_192.168.102.0 network object
from rule 4.
Security Zones is a nice option. Using the interface topology our
rule will match packets going to the Internet and not to the DMZ
zone.
Add the ExternalZone object to rule 4. Then drag and drop to
add it to rules 4 -10.
Install the policy.
©2020 Check Point Software Technologies Ltd. 7
R80 Security Management Lab
Policy Review
In addition to having a policy that matches our intent:
our policy will be easier to apply to other R80.x gateways as a shared
layer
provides better performance
To understand this last point, press the F1 key to open the SmartConsole
online help.
©2020 Check Point Software Technologies Ltd. 8
R80 Security Management Lab
Policy Review
Search for performance, click Best Practices for Access Control Rules.
©2020 Check Point Software Technologies Ltd. 9
R80 Policy
Layers
©2020 Check Point Software Technologies Ltd. 10
R80 Security Management Lab
Policy Layers
One way to improve performance is to add layers to a policy.
The first connection traverses the rule base from the top to the bottom until a match is found.
In our policy this means that packets from the DMZ traverse rules 1 – 11 first before a match is
found.
Typically the DMZ includes servers accessible from the Internet such as web servers. These may
have a high hit count.
Over time we can use rule hit counts to move rules with higher hit counts up to optimize our policy.
We can also use layers; inline and ordered.
©2020 Check Point Software Technologies Ltd. 11
R80 Security Management Lab
Inline Layer
Inline policies have a parent rule.
Connections matching the parent rule are then
inspected by rules in the inline layer.
Connections that do not match the parent rule
skip the inline layer and then are checked
against the next rule in the policy.
©2020 Check Point Software Technologies Ltd. 12
R80 Security Management Lab
Packet Flow: Inline and Ordered Mode
Access Layer Content Layer Data Layer
Web Control Layer
Rule 5.3 Accept Rule 8: Accept
Rule 10: Accept
Inline Layer
Ordered Layers
©2020 Check Point Software Technologies Ltd. 13
R80 Security Management Lab
Inline Layer
Rules 4 – 8 can be moved to an inline layer.
Add a rule above rule 4.
Drag the Source and Destination objects from rule 5 to rule 4.
Click in the Action column and select Inline Layer -> New Layer.
New layer
©2020 Check Point Software Technologies Ltd. 14
R80 Security Management Lab
Inline Layer
Name the layer Web Control
Select only Applications & URL Filtering for the
blades.
Enable Sharing: Multiple policies and rules can
use this layer.
Click Advanced and change the Implicit
Cleanup Action to Accept.
Click on Permissions and notice we can restrict
access to specific profiles to limit access to this
section of the rulebase.
©2020 Check Point Software Technologies Ltd. 15
R80 Security Management Lab
Inline Layer
Click OK and this creates the Inline layer.
Change the default explicit Cleanup rule 4.1 Action to Accept
and the Track to Log.
Select rules 5 – 9. Right click in the No. column, select Copy.
Copy
©2020 Check Point Software Technologies Ltd. 16
R80 Security Management Lab
Inline Layer
Select rule 4.1.
Right click in the No. column and select Paste above.
Paste above
©2020 Check Point Software Technologies Ltd. 17
R80 Security Management Lab
Inline Layer
This adds the rules to our inline layer. To make our layer more general remove Net_192.168.101.0 from the
Source column of rules 4.1 through 4.5. Ensure the 4.6 cleanup rule Action is Accept.
Select rule 5 – 9, right click in the No. column, select Delete. Click OK to confirm. Install the policy.
©2020 Check Point Software Technologies Ltd. 18
R80 Security Management Lab
Inline Layer
Monitor the Policy Installation by expanding tasks (lower left) and notice that it fails to install.
• Click Details. This means rules 5 and 6 will never be matched. The service Any in rule 4 will
always be matched first.
Note: Rules 4, 5, 6 source and
destination are the same
©2020 Check Point Software Technologies Ltd. 19
R80 Security Management Lab
Inline Layer
Lets try to solve this by creating and inline
data control layer for rules 5 and 6 and
specifying the services that Content
Awareness matches.
Click Close to exit the policy install Details.
Navigate to MANAGE & SETTINGS ->
Blades -> Content Awareness Advanced
Settings
Notice this blade matches ftp, http/s,
HTTP/S_proxy, and smtp.
©2020 Check Point Software Technologies Ltd. 20
R80 Security Management Lab
Inline Layer
Navigate back to the security policy and add a rule above rule 4.
Add the ftp, http, https, HTTP_proxy, HTTPS_proxy, smtp to the Services &
Applications column.
Click in the Action column and select Inline layer -> New Layer.
©2020 Check Point Software Technologies Ltd. 21
R80 Security Management Lab
Inline Layer
Name the layer Data Control.
Enable Content Awareness only.
Enable Sharing: Multiple policies and
rules can use this layer.
Select Advanced and change the
Implicit Cleanup Action to Accept.
Click OK.
©2020 Check Point Software Technologies Ltd. 22
R80 Security Management Lab
Ordered Layer
The policy installs now, but is not optimized. A better policy has content inspection lower in the rule order
To fix this we could include the content awareness rules in the Web Control layer as before, but R77.x gateways
don’t support content awareness and we’d like the option of using the web control layer in our R77.x policies.
When we review the packet flow in slide 14 we notice that we can use layers in order instead of inline.
Select rule 4. Right click in the No. column and select Delete.
Click Yes to confirm the deletion.
Delete
©2020 Check Point Software Technologies Ltd. 23
R80 Security Management Lab
Ordered Layer
Right Click on Policy and select Edit policy.
Click + and add the Data Control layer to our
Access Control policy.
Click OK.
Click +
©2020 Check Point Software Technologies Ltd. 24
R80 Security Management Lab
Ordered Layer
This adds Data Control to our Access Control policy after
the Network layer.
Click OK.
Ordered layers
Notice that our 2 layers now show in the Access Control
policy.
If we wanted to we could change the order in Edit
Policy.
Click Data Control to see the Data Control policy. Ordered layers
Install the policy.
©2020 Check Point Software Technologies Ltd. 25
R80 Security Management Lab
Ordered Layer
Test the policy by browsing to www.torproject.org and sites that fall into the alcohol category.
Search for putty or browse to https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html.
Try downloading some of the files to verify our policy works as expected.
Select the Data Control rule 1 and double click to open one of the logs.
Notice the Matched Rules include the Web Control and the Data Control layers.
©2020 Check Point Software Technologies Ltd. 26
R80 Security Management Lab
Ordered Layer
Navigate to Menu -> Manage policies and layers.
Click Layers and notice the mode of the Data Control and Web Control layers
in the Standard policy. One is inline and the other is ordered.
©2020 Check Point Software Technologies Ltd. 27
1. Extra Credit: Do we need to modify the
Web Control layer to be compatible
with R77.x gateways?
2. Can we delete the Net_192.168.101.0
Review object from the source column in the
Questions Data Control layer?
3. Do we need to delete the
ExternalZone object in the Data
Control layer to make it compatible
with R77.x gateways?
©2020 Check Point Software Technologies Ltd. 28
1. Extra Credit: Do we need to modify the Web
Control layer to be compatible with R77.x
gateways?
1. Yes, security zones are not supported in R77.x
gateways. We can change it to Internet. Our
Standard parent rule will match the External
Zone.
2. Can we delete the Net_192.168.101.0 object from
Review the source column in the Data Control layer?
Answers 2. Yes, the Web Control parent rule in the
Standard policy will match Source
192.168.101.0 packets and then the packets will
be inspected by our Data Control layer.
3. Do we need to delete the ExternalZone object in
the Data Control layer to make it compatible with
R77.x gateways?
3. No, this layer can only be used in R80.x
gateways.
©2020 Check Point Software Technologies Ltd. 29
Advanced Topics
©2020 Check Point Software Technologies Ltd. 30
Check Point Community
CheckMates Community
©2020 Check Point Software Technologies Ltd. 31
End of Security
Management Lab
©2020 Check Point Software Technologies Ltd. 32