Checkpoint SIC
中国移动Checkpoint防火墙安全配置手册V0.1.doc

密级:文档编号:项目代号:中国移动Checkpoint防火墙安全配置手册Version *.*中国移动通信有限公司二零零四年十一月拟制: 审核: 批准: 会签: 标准化:Firewall 版本控制分发控制目录1 综述 (5)2 Checkpoint的几种典型配置 (6)2.1 checkpoint 初始化配置过程: (6)2.2 Checkpoint Firewall-1 GUI安装 (13)2.3 Checkpoint NG的对象定义和策略配置 (18)3 Checkpoint防火墙自身加固 (34)1综述本配置手册介绍了Checkpoint防火墙的几种典型的配置场景,以加强防火墙对网络的安全防护作用。
同时也提供了Checkpoint防火墙自身的安全加固建议,防止针对防火墙的直接攻击。
通用和共性的有关防火墙管理、技术、配置方面的内容,请参照《中国移动防火墙安全规范》。
2Checkpoint的几种典型配置2.1 checkpoint 初始化配置过程:在安装完Checkpoint软件之后,需要在命令行使用cpconfig命令来完成Checkpoint的配置。
如下图所示,SSH连接到防火墙,在命令行中输入以下命令:IP350[admin]# cpconfigWelcome to Check Point Configuration Program=================================================Please read the following license agreement.Hit 'ENTER' to continue...(显示Checkpoint License版权信息,敲回车继续,敲q可直接跳过该License提示信息)Do you accept all the terms of this license agreement (y/n) ?y(输入y同意该版权声明)Which Module would you like to install ?-------------------------------------------(1) VPN-1 & FireWall-1 Enterprise Primary Management and Enforcement Module(2) VPN-1 & FireWall-1 Enforcement Module(3) VPN-1 & FireWall-1 Enterprise Primary ManagementCheckpoint Firewall-1/VPN-1支持多种安装模式,Firewall-1/VPN-1主要包括三个模块:GUI:用户看到的图形化界面,用于配置安全策略,上面并不存储任何防火墙安全策略和对象,安装于一台PC机上;Management:存储为防火墙定义的各种安全策略和对象;Enforcement Module:起过滤数据包作用的过滤模块,它只与Managerment通信,其上的安全策略由管理模块下载;以上三个选项中如果Management与Enforcement Module安装于同一台设备上,则选择(1),如果Management与Enforcement Module分别安装于不同的设备上,则选择(2)或(3)。
Check Point教程

Check point防火墙基本操作手册CheckPoint(中国)TEL:(86)10 8419 3348 FAX:(86)10 8419 3399©2010 Check Point Software Technologies Ltd. All rights reserved.Classification:目录目录 (2)防火墙架构 (3)防火墙的Web管理 (3)配置IP: (4)配置DNS和Host: (5)配置路由: (5)通过防火墙的管理客户端管理 (5)添加防火墙 (7)添加策略步骤 (10)IP节点添加 (10)添加网段 (11)IPS的配置 (13)更新IPS库 (14)新建IPS动作库 (14)应用控制 (16)更新数据库 (16)添加应用控制策略 (17)App Wike (18)自定义添加应用 (18)QOS配置 (20)Qos策略的添加 (20)日志工具的使用 (20)筛选日志 (21)临时拦截可以连接 (22)©2010 Check Point Software Technologies Ltd. All rights reserved.Classification:©2010 Check Point Software Technologies Ltd. All rights reserved.Classification:防火墙架构Check point 防火墙的管理是通过一个三层架构来实现的。
首先我们可以在任意的机器上安装防火墙客户端控制台,然后利用控制台的图形化界面登录check point 的管理服务器,定义出各个网络对象,定义企业各条策略,最后下发到防火墙执行模块。
具体实现过程见图示:防火墙的Web 管理首先打开Web 管理界面,出现登录界面:登陆后的界面设备的Web界面只能配置设备的IP地址,网关,DNS和路由。
还可以针对设备的事件,SNMP监控,代理等信息。
Checkpoint-管理服务器的HA

管理服务器(SmartCenter)的HA一.概述环境:一台设备是管理服务器+gateway(已经安装好),另一台设备只安装secondary 管理服务器(下面会显示安装和配置)。
这里只演示安装secondary管理服务器以及HA的配置。
Checkpoint的这个功能,不会自动切换的,需要手动进行切换。
二.安装Secondary Management光盘安装过程一样,仅仅在网页进行初始化的时候选择有不同。
在初始化只选择Security Management和选择secondary。
输入连接密码vpn123然后退出没配置HA的话是不能登录到Secondary的服务器上的。
三.配置Management HA登录到主Management的smartdashboard,右键新建一个Checkpoint的HOST类型的对象然后编辑这个对象,填上IP信息和management的相关属性打勾输入密码vpn123然后建立SIC建立成功然后在Topology里新建一个接口点击OK关闭编辑这个对象!这个时候这个对象就新建好了。
确认一下是否已经选择了自动同步(默认)然后在菜单栏选择Launch menu----policy----Install the Datebase将策略都下发到两个管理服务器上在菜单栏选择Launch menu----policy----Management High Availability查看同步状态:这里显示是Never Synchronization!等待变成Synchronization。
注意:记得添加防火墙规则,让GW和新的管理服务器能够互相通信四.如何切换如果要切换,直接点击“Change to Standby”(注意只开启dashboard,关闭其他smarconsole应用程序),让主服务器变成Standby状态。
点击YES,将会失去和主管理服务器的连接然后输入副服务器的IP连接到新的管理服务器上。
Check Point Smartcenter安装步骤(WIN2K3)

防火墙管理服务器(SmartCenter)安装步骤(win2003)CheckPoint(中国)TEL:(86)10 8419 3348FAX:(86)10 8419 3399文档修订记录标题 smartCenter安装步骤(win2003)管理文档 □ 设计方案 □ 实施文档 X 类别配置文档 □ 测试文档 □ 其他 □ 当前版本 1.00创建日期 2010-05-01文档作者文件名称 smartCenter安装步骤(win2003)版本号 日期 修改人 审阅人 摘要1.00 2010-05-01 初稿文档说明此文档是由以色列捷邦安全软件科技公司于2010年05月制定的内部文档。
本文档仅就CheckPoint内部与相关合作伙伴和CheckPoint最终用户使用。
版权说明本文档中出现的任何文字叙述、文档格式、插图、照片、方法、代码等内容,除由特别注明,版权均属于以色列捷邦安全软件科技公司所有,受到有关产权及版权法保护。
任何个人、机构未经以色列捷邦安全软件科技公司的书面授权许可,不得以任何方式复制或引用本文档的任何片断。
1.安装smartcenter for win2003sp2第一步,准备好Windows 2003操作系统,安装最新的安全补丁,杀毒软件并且更新到最新版本,同时对smartCenter管理服务器进行必要加固,如选择复杂的管理员密码,关闭文件共享服务和其他不必要的服务。
将安装介质插入光驱,选择所使用的 smartcenter NGX R65 for windows 版本第二步,开始安装,根据购买的版本选择,在此选择 checkpoint power‐‐Æforward第三步,选择new installation 全新安装。
第四步,选择所要安装的组件,第一项Gateway是火墙,第二项Management是管理组件,比如报表模块,IPS‐1管理模块,以及火墙管理Console,在此只安装smartcenter/smartconsole,第五步,不需选择install plugin 插件,因为该模块为Connectra(SSL VPN网关)管理服务器,如果有connectra(SSL VPN网关)需要被集中管理,则请选用该组件,也可以以后再安装。
CheckPoint防火墙安装手册

防火墙安装操作手册By Shixiong Chen一、准备安装介质和服务器安装CheckPoint防火墙基于开放的服务器平台需要准备两点:如果选用的是Checkpoint的硬件,UTM-1则不需要考虑这些问题。
第一,准备好服务器,服务器最好选择IBM\HP\或者其他大品牌厂商的硬件平台,并且事先确认该品牌和型号的服务器与CheckPoint软件兼容性,将网卡扩展至与真实火墙一致,服务器需要自带光驱。
第二,准备好CheckPoint防火墙安装介质,注意软件的版本号与真实环境火墙一致,同时准备好最新的防火墙补丁。
二、SecurePlatform系统安装过程硬件服务器初始状态是裸机,将服务器加电后,设置BIOS从光盘启动,将CheckPoint软件介质放入光驱,然后出现如下界面:敲回车键盘开始安装。
出现如下界面,选择OK,跳过硬件检测。
选择安装的操作系统类型,根据自己防火墙操作系统的版本选择。
SecurePlatform Pro是带有高级路由和支持Radius的系统版本。
选择键盘支持的语言,默认选择US,按TAB键,继续安装。
配置网络接口,初始我们配置外网接口即可,选择eth0配置IP, 输入IP地址、子网掩码、以及默认网关,然后选择OK,继续。
选择OK.开始格式化磁盘。
格式化完成后开始拷贝文件,最后提示安装完成,按照提示点击OK.系统会自动重新启动。
然后出现登陆界面,如下所示。
第一次登陆系统,默认账号和密码都是admin,登陆后需要出入新的密码和管理员账号。
三、CheckPoint防火墙软件安装过程运行sysconfig 命令,启动安装防火墙包。
选择n,继续安装。
打开网络配置页面,选择1,配置主机名,选择3配置DNS服务器,选择4配置网络,选择5配置路由,注意要与生产线设备的配置保持一致,特别是路由要填写完整,主机名、接口IP和子网掩码要填写正确。
配置完成后,选择n,下一步继续配置,如下图所示,选择1配置时区(选择5,9,1),选择2配置日期,选择3配置本地系统时间,选择4查看配置情况。
Checkpoint防火墙命令行维护说明材料

Checkpoint防火墙命令行维护手册制订模版:NGX-R65版本号:V1.0目录一、基本配置命令 (1)1.1SYSCONFIG (1)1.2CPCONFIG (2)1.3CPSTOP (3)1.4CPSTART (3)1.5EXPERT (4)1.6IDLE (4)1.7WEBUI (4)1.8脚本添加路由 (4)二、查看系统状态 (1)2.1TOP (1)2.2DF –H (3)2.3FREE (3)三、HA相关命令 (1)3.1CPHAPROB STAT (1)3.2CPHAPROB –A IF (1)3.3CPHACONF SET_CCP BROADCAST (1)3.4CPHAPROB LIST (2)3.5CPHASTART/CPHASTOP (3)四、常用维护命令 (1)4.1VER (1)4.2FW VER (1)4.3查看防火墙UTM/POWER版本 (1)4.4查看防火墙硬件型号 (1)4.5LICENSE查看和添加 (1)4.6IFCONFIG/IFCONFIG –A (1)4.7MII-TOOL (1)4.8ETHTOOL (1)4.9CPSTAT FW (2)4.10会话数查看 (1)五、日志查看命令 (1)5.1FW LOG (1)5.2FW LSLOGS (1)5.3FW LSLOGS –E (1)5.4FW LOGSWITCH (2)5.5导出日志文件 (2)六、防火墙的备份和恢复 (1)6.1备份防火墙 (1)6.2在IE中备份 (1)6.4恢复防火墙 (2)一、基本配置命令1.1sysconfig可以对系统进行配置和修改,比如主机名修改,DNS配置修改,以及路由的配置等,另外还可以配置DHCP功能,以及产品的安装等等如上图所示,在命令提示符输入:sysconfig,将会出现下图所列一些选项,在Your choice后面输入你想配置的选项前的数字,然后按回车可以看到,依次的选项为主机名,域名,域名服务,时间和日期,网络连接,路由,DHCP服务配置,DHCP中继配置,产品安装,产品配置等例如我们选择5,为防火墙新增一个接口IP地址然后选择2,进行连接配置,也就是配置IP地址选择1进行IP地址配置更改如上图所示按照提示配置IP地址和子网掩码进行其他配置也如同上述操作,选择对应的编号然后按照提示进行配置1.2cpconfig可以对checkpoint防火墙进行相关的配置,如下图所示,也是按照列表的形式列出,分别是license,snmp,PKCS#11令牌,随机池,SIC,禁用cluster,禁用安全加速,产品自动启动常用的选项一般为SIC的配置,cluster功能模块的启用等;选择7是开启cluster功能模块;选择5是设置SIC。
checkpoint培训手册[1]
![checkpoint培训手册[1]](https://img.taocdn.com/s3/m/2cade610a76e58fafab00366.png)
完成Hide NAT的配置后我们需要验证NAT是否配置成功
对服务器作静态NAT
首先把服务器对象定义出来,在Nodes上点击右键,然后选择Host,然后 配置服务器的属性,再选择左边窗口中的NAT属性。
点击NAT,编辑NAT属性,选择Add Automatic Address Translation rules,然后在 Translation method 中选择选择Static,然后在下面的小框中输入自己分配给服 务器的公网地址。最后在install on上选择当前防火墙然后点击确定。静态 NAT就配置完成。
• 出现防火墙接口信息,如果我们系统的接 口和路由配置好后,我们单击Get,然后选择 Interface或是interface with topology 就可以 得到接口配置信息。这里我们需要在网ቤተ መጻሕፍቲ ባይዱ 接口上配置Anti Spoofing ,所以首先双击其 中任一接口开始配置。首先双击外网接口, 在下面弹出的对话框中选择Topology,
在防火墙上重置SIC
• • • • • • • • • • • • • • • • • • • • • • 在防火墙上重置SIC [admin@C25-HJZX-IDC-1 admin]$ su Password: [root@C25-HJZX-IDC-1 admin]# cpconfig This program will let you re-configure your Check Point products configuration. Configuration Options: ---------------------(1) Licenses (2) SNMP Extension (3) Group Permissions (4) PKCS#11 Token (5) Random Pool (6) Secure Internal Communication (7) VPNx (8) Disable cluster membership for this gateway (9) Disable Check Point SecureXL (10) Automatic start of Check Point Products (11) Exit Enter your choice (1-11) :6 Configuring Secure Internal Communication... ============================================ The Secure Internal Communication is used for authentication between Check Point components Trust State: Trust established Would you like re-initialize communication? (y/n) [n] ? y Note: The Secure Internal Communication will be reset now, and all Check Point Services will be stopped (cpstop). No communication will be possible until you reset and re-initialize the communication properly! Are you sure? (y/n) [n] ? y Enter Activation Key: xxxxxx Retype Activation Key: xxxxxx initial_module: Compiled OK.
APA格式中文写作指南

APA格式中文写作指南APA格式中文写作指南雷雳(首都师范大学教育科学学院自然科学心理学系,北京2001年8月)摘要第二页应包含论文摘要。
摘要是简洁而全面地对您的论文的总结。
摘要应该是准确的、具体的、简练且明确的、非评价性的、连贯的、易读的。
它初衷仍须反映您论文的目的和内容。
英译摘要长度不超过960个字符和空格(大约120字),外语摘要长度不超过480字(包括标点)。
综述性或理论性的论文摘要,英文应限制在75—100字左右,中文为300-400字左右。
美国心理协会提出不该这类论文应该包含以下信息:用一个句子写成的考题;论文的目的、主题,或论文的组织整体和论文涉猎的范围(先期的或有选择的);材料来源(亲自的观察、已发表的文献);还有结论。
摘要以“块”的形式呈现,不分段,首行缩进4个空格(两个汉字的空间)。
APA格式中文写作指南APA写作格式是美国心理基金会出版手册(第4版,1994)上面制定的撰写格式。
本指南是撰写论文的一个简捷的参考,并不能完全替换手册本身。
记住:若你正在为一门课撰写一篇论文,那么导师的具体要求比手册的要求则更重要。
每个检验点(checkpoint)结尾处给出的页码告诉我们到何处去寻找出版手册中关于主题的具体信息。
一、基本格式1. 从页顶、底、边算起,页边空白为2.54cm(除稿件页眉外)。
2. 所有地方均使用1.5倍行距。
3. 英文字体使用Courier 或Times Ne., i.e.。
(四)数字用阿拉伯数字表示10以上的数(12、50,等),除非要和10如下的数进行对比。
比如,4年级与11年级进行对比检验。
但在摘要中所有数字都应用阿拉伯数字表示。
在使用英文时,句首和小于10的数字应完整详尽复制出英文单词,此时中文则使用汉字,英文数字复数只需在数字后面加上s,而无需加“’”号(the 1990s)。
数字单词和数字的联合应紧接着被修饰对象(six 2-point scales)。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Secure Internal Communications (SIC) 26-Jun-2001NG-FCS VersionAbstractCheck Point Software has enhanced the Internal Communications method for the components within a Next Generation (NG) Check Point System. This method is based on Digital Certificates, and will be further described below. This is a new and improved method for all of the internal communications, so if you are familiar with "fw putkeys", you will not have to go back there…Document Title: Secure Internal CommunicationsCreation Date: 08-Feb-2001Modified Date: 26-Jun-2001Document Revision: 2 (meaning this is the 3rd revision)Product Class: FireWall-1 / VPN-1Product and Version: NGAuthor: Joe DiPietroDISCLAIMERThe Origin of this information may be internal or external to Check Point Software Technologies. Check Point Software Technologies makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Check Point Software Technologies makes no explicit or implied claims to the validity of this information.Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.Given the Diagram below, we will establish a Trust Relationship with the Management Station and the FireWall-1 Module. The Management Server is located at 10.1.2.3, and the FireWall-1 Module will be defined as 10.1.2.1.Table of ContentsDescription Page SIC Overview (3)FireWall-1 Object Definition on Management Station (4)Initialize Trust Relationship (5)Interface Definition (6)Policy Install (8)Troubleshooting (9)Netstat (9)cpstop/cpstart (10)cpd –d (10)Secure Internal Communications (SIC) is the new method for how Check Point components will communicate with each other in Check Point Next Generation (NG). It is based on SSL with Digital Certificates. When you install the management station, you will create a Certificate Authority (CA). This Certificate Authority will issue certificates for all components that need to communicate to each other. For example, a distributed FireWall-1 Module will need a certificate from the management station prior to downloading a policy to this module (or even licensing this module remotely via the new license method). Here is a quick snapshot of a Primary Management Station installation, where the CA will be created.Once the Primary Management Station is up and active, then it can initialize the remote FireWall-1 Module if it has the same One Time Password (OTP). The following screen shows a snapshot of the FireWall-1 Module installation, where youmust enter a One Time Password(OTP) for the InitializationProcess with the ManagementStation. You can also run"cpconfig" after the installationand initialize the OTP at thatpoint.FireWall-1 Module InstallationDefining the Network Object on the Management StationWhen defining the Network Object for SIC communications on the Management Station, the password entered must match the OTP defined on the module, in order for the Certificate to be distributed to the FireWall-1 Module and communications to be established. The screen below shows the object definition for a FireWall-1 Module. This has changed significantly from prior versions.In this example, the Module is a "Gateway " with Check Point version "NG " Installed.Also, note that you must now select what components are installed on this machine. In our case, we have VPN-1 & FireWall-1 installed .Please notice that until the DN: portion is filled in, we are not communicating with thismodule. We must now select Communication in order to initialize the SIC process.Remember, the Management Station must be able tocommunicate to the Remote Module before you can "remotely" apply the Check Point license from the Management Station.By selecting "communication " above, thescreen on the left appears. This is where we need to enter the OTP that was defined on the FireWall-1 Module during installation as shown below.Next select, InitializeNotice that we now have a "Trust" relationshipestablished between the Management Station and the FireWall-1 Module. SIC is now up and running.Unlike putkeys, it is possible to check that SIC is Working. Using the Test SIC status you will see that GW1 is communicating.NB: Name resolution must be functioning correctly.The Management Station is nowcommunicating with the FireWall-1 Module, and the Certificate has been issued and received. Notice the DN: field at the bottom of this object. It is now filled in with the appropriate information.Next, continue defining the other components of the Gateway Object so that the Management Station will be able to push a policy to the FireWall-1 Module.You must define the FireWall-1 “interfaces ” at a minimum. Select the “Topology ” tab, and then Select “Get Interfaces ”.The screen to the left will show up with filled in Interface Information.Next, Edit the interface information.Next Select the “Topology” tab of the Interface Properties. This is where we will define what connects to this particular Interface. In our example, this interface will connect to the Internet. Also note, that Anti-Spoofing information can be based off of the Topology Information defined here.Define the Internal Interface information as shown.Now the final interface definition is shown on the RightThis is where we can also define the VPN Domain information. So far, we have the following Network Diagram as created by the Visual Policy Editor.The Management Station (mgmt-p- 10.1.2.3), the FireWall-1 Gateway (GW1- 10.1.2.1), and the three networks defined by the topology information(10.1.2.1/255.255.255.0), (192.168.10.0/255.255.255.0), and (199.203.71.0/255.255.255.0) which connects to the Internet Cloud.If we select “Show” under the “VPN Domain” in the screen above, this will show us what the“Encryption” domain will be calculated to be. It is shown in the screen below with the highlighted objects in Red.For our Purposes, we will make it just the 192.168.10.0 network. So the final VPN Topology information will be as follows:Please note that we have made this topology “exportable” for SecuRemote. This will allow us to download this topology information to the SecuRemote machine.Now we can push the policy:Select “OK ” from the scre en on the right, and the screen below will appear:Notice that the Policy was successfully installed.TroubleshootingIf you get the following error message, a number of things could be wrong:1. Connectivity issues from the ManagementStation to the FireWall-1 Module2. CPshared is not installed on the FireWall-1Module3. The FireWall-1 Module is not listening on theproper ports for the SIC communicationsThis is the next screen that appears on the Management Station. This means the digitalcertificate has been initialized on the CA, but has not been delivered to the FireWall-1 Module.Let's troubleshoot at the FireWall-1 ModuleFirst check the Network Port that SIC is trying to listen on with the"netstat" command. It should be listening on port 18211 as shown to the right.If you see the screen above, reset your OTP by using the CPCONFIG utility as shown to the right by selecting:Start → Programs → Check Point Management Clients → Check Point Configuration NG on the FireWall-1 ModuleRemember to use the same password on theManagement Station, as you define within this screen.After you initialize the OTP again, then try and Initialize the object at the management station.If you don't see the host listening on this port, then perform the following steps as shown belowThere is a common infrastructure component called "CPShared" with Check Point NG. This component is located under C:\Program Files\CheckPoint\CPShared\5.0. There is a subdirectory call "bin", which has all of the commands for this shared component. To stop and start the shared component infrastructure, use the commands "CPSTOP " and "CPSTART " respectively. An excellent troubleshooting program for this communications is the "CPD " application. To troubleshooting the SIC communications between the Management Station and the FireWall-1 Module, perform the following steps on the FireWall-1 Module. First stop all of the FireWall-1 Processes on the module with the "cpstop" command.Now, put the Module into Debug Mode by running the CPD application with the "-d" flag.Now try and "initialize" the FireWall-1 object on the Management Station by selecting the "Initialize" button as shown to the right.If the OTP's are in sync, then you should see the "Trust Established" on the management station, as shown to the right.On the FireWall-1 Module, you will see the following:If the FireWall-1 Module already has a certificate, as shown below:Re-initialize the OTP, so that the Management Station can issue the correct certificate to this FireWall-1 Module.In this particular case, SIC has already been initialized on this module, but unable to communicate with the Management Station. You have to reset the OTP in order to get another certificate from the Management Station as shown below.Select "Reset " as shown on the rightThe following screen will appear to remind you that the OTP's must be the same on the Management Station object, and the FireWall-1 Module.Select "Yes", and then enter the OTP on the FireWall-1 Module.Next restart the "CPShare" processes by issuing "cpstop " and then "cpstart " commands.Next, try to "initialize" the Object at the Management Station, and you should see the following screen to the right.。