Security Management Portal Installation Guide
Transcription
Security Management Portal Installation Guide
Security Management Portal Security Management Portal Installation Guide Installation Guide Version 8.1 Part No.: 701425 © 2012 Check Point All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying, distribution, and decompilation. No part of this product or related documentation may be reproduced in any form or by any means without prior written authorization of Check Point. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19. TRADEMARKS: Refer to the Copyright page (http://www.checkpoint.com/copyright.html) for a list of our trademarks. Refer to the Third Party copyright notices (http://www.checkpoint.com/3rd_party_copyright.html) for a list of relevant copyrights and third-party licenses. Latest Software We recommend that you install the most recent software release to stay up-to-date with the latest functional improvements, stability fixes, security enhancements and protection against new and evolving attacks. Latest Documentation The latest version of this document is at: http://supportcontent.checkpoint.com/documentation_download?ID=12827 For additional technical information, visit the Check Point Support Center (http://supportcenter.checkpoint.com). Revision History Date Description 18 April 2012 Rebranded to Check Point April 2010 First release of this document Contents Contents Introduction ........................................................................................................................................... 1 About This Guide ................................................................................................................................ 1 Intended Audience .............................................................................................................................. 1 Document Conventions ....................................................................................................................... 2 Related Publications ............................................................................................................................ 2 Contacting Technical Support ............................................................................................................. 2 SMP Architecture ................................................................................................................................. 3 Secuirty Management Server (SMS) ................................................................................................... 3 Secuirty Management Center (SMC) .................................................................................................. 4 Self Provisioning Portal (SPP) ............................................................................................................ 4 SMP Virtual Portals ............................................................................................................................ 5 Event Logging Module (ELM) ........................................................................................................... 5 URL Filtering Module (UFM) ............................................................................................................ 6 Content Vectoring Module (CVM) ..................................................................................................... 8 VStream Antivirus Signature Updates Service ................................................................................. 11 VStream Antispam Service ............................................................................................................... 11 Load Balancing Module (LBM) ........................................................................................................ 12 Dynamic VPN Service (DVPN) ........................................................................................................ 12 Dynamic DNS Service (DDNS) ........................................................................................................ 14 Check Point Reporting Module ......................................................................................................... 16 Vulnerability Scanning Service (VSS) .............................................................................................. 17 Installation Schemes ........................................................................................................................... 19 Basic Installation ............................................................................................................................... 20 SMS High Availability Installation ................................................................................................... 21 SMS High Availability with Load Balancing Installation................................................................. 24 Multiple Portals Installation .............................................................................................................. 25 Contents i Contents Preparing for SMP Installation ......................................................................................................... 27 System Requirements ........................................................................................................................ 27 Tips for Capacity Planning ................................................................................................................ 28 Installing a Directory Service ............................................................................................................ 31 Freeing Ports ..................................................................................................................................... 32 Installation ........................................................................................................................................... 33 Installing SMP................................................................................................................................... 35 Uninstalling SMP .............................................................................................................................. 45 Upgrading the SMP ........................................................................................................................... 46 Backing Up the SMP Installation ...................................................................................................... 50 Restoring the SMP Installation ......................................................................................................... 51 Editing the SMC Configuration File ................................................................................................. 53 Editing the SMS INI File .................................................................................................................. 58 Configuring the SMS to Ignore Disabled Gateways ......................................................................... 62 Troubleshooting .................................................................................................................................. 63 Protecting the SMP behind a Firewall .............................................................................................. 67 Replicating Databases ......................................................................................................................... 71 Configuring the Secuirty Content Filtering Server .......................................................................... 73 Configuring SCS General Settings .................................................................................................... 74 Configuring ClamAV Settings .......................................................................................................... 77 Configuring SpamAssassin Settings ................................................................................................. 78 Glossary of Terms ............................................................................................................................... 81 Index ..................................................................................................................................................... 91 ii Security Management Portal Installation Guide About This Guide Chapter 1 Introduction The Check Point Security Management Portal (SMP) is a security platform that enables centralized management of a large number of firewalls embedded in broadband access devices or gateways. SMP management can be seamlessly integrated with customer and billing systems, Check Point management infrastructure, and OPSEC-compliant third-party applications. This chapter includes the following topics: About This Guide .........................................................................................1 Intended Audience ........................................................................................1 Document Conventions ................................................................................2 Related Publications .....................................................................................2 Contacting Technical Support ......................................................................2 About This Guide This guide contains all the information necessary to install all SMP components, as well as the sample third-party CVP and UFP programs included on the Check Point CD. Intended Audience This guide is written for the system administrator in charge of installing the SMP. This person should be familiar with the following: Either Microsoft Active Directory or SunONE Directory Server 5.1 Check Point Enterprise Management Console or Check Point SmartDashboard SMP architecture. See SMP Architecture on page 3. Chapter 1: Introduction 1 Document Conventions Document Conventions To make finding information in this manual easier, some types of information are marked with special symbols or formatting. Boldface type is used for command and button names. Italics are used when specifying which SMP administrator levels can perform a task. Note: Notes are denoted by indented text and preceded by the Note icon. Warning: Warnings are denoted by indented text and preceded by the Warning icon. Related Publications This guide should be used in conjunction with the following guides: Check Point Security Management Portal Administrator Guide This guide explains how to use the Security Management Center (SMC), a Web-based application for managing, configuring, and monitoring all SMP user and system settings. Check Point Security Management Portal Programmer Guide This guide explains how to use the SMP API and SMP message templates. Contacting Technical Support For support and additional documentation, see www.checkpoint.com/support (http://supportcenter.checkpoint.com). When you contact us, please state which version of SMP you are currently using. 2 Security Management Portal Installation Guide Secuirty Management Server (SMS) Chapter 2 SMP Architecture Check Point's technology is based on a distributed architecture, where each user is protected by an enforcement module embedded in a gateway. You can centrally manage an essentially unlimited number of enforcement modules from a Network Operating Center (NOC), using a scalable, fault-tolerant and secure array of Secuirty Management Servers (SMS), and large-scale management tools such as the Secuirty Management Center (SMC). This chapter includes the following topics: Secuirty Management Server (SMS) ............................................................3 Secuirty Management Center (SMC) ...........................................................4 Self Provisioning Portal (SPP) .....................................................................4 SMP Virtual Portals ......................................................................................5 Event Logging Module (ELM) .....................................................................5 URL Filtering Module (UFM) ......................................................................6 Content Vectoring Module (CVM) ..............................................................8 VStream Antivirus Signature Updates Service ...........................................11 VStream Antispam Service ........................................................................11 Load Balancing Module (LBM) .................................................................12 Dynamic VPN Service (DVPN) .................................................................12 Dynamic DNS Service (DDNS) .................................................................14 Check Point Reporting Module ..................................................................16 Vulnerability Scanning Service (VSS) ....................................................... 17 Secuirty Management Server (SMS) Check Point Secuirty Management Servers (SMS) obtain gateway-specific information from the SMP's LDAP directory server, and provide each gateway with a security policy, a user interface, configuration updates, and the following added-value services: Event logging, using the Event Logging Module (ELM) on page 5 Family filters, using the URL Filtering Module (UFM) on page 6 Content vectoring, using the Content Vectoring Module (CVM) on page 8 Chapter 2: SMP Architecture 3 Secuirty Management Center (SMC) Dynamic virtual private networking, using the Dynamic VPN service (DVPN) on page 12 Dynamic domain name service, using the Dynamic DNS service (DDNS) on page 14 Check Point reporting, see Check Point Reporting Module on page 16 VStream Antivirus signature updates service, see VStream Antivirus Signature Updates Service on page 11 Vulnerability Scanning service, see Vulnerability Scanning Service (VSS) on page 17 SMSs are organized in server groups. The SMSs in a group can perform load balancing within the group, using the Load Balancing Module (LBM). For information on LBM, see Load Balancing Module (LBM) on page 12. SMSs can also perform failovers, so that if a server has failed for some reason, gateways will automatically switch to a functional one. Secuirty Management Center (SMC) The Check Point Secuirty Management Center (SMC) is a Web-based application for controlling the various SMP components and for managing, configuring, and monitoring all SMP user and system settings. SMP administrators can connect to the SMC using Web browsers and perform administrative tasks such as setting customer details, gateway configuration, user firmware updates, and so on. When multiple SMP installations exist, each SMC can be configured as “active” or “standby”. If an SMC is in active mode, then administrators can log in to that SMC, and background tasks (such as report generation and sending) are enabled for it. If an SMC is in standby mode, then administrators cannot log in to it, and background tasks are disabled. The SMC is hosted on an Apache Tomcat 5.5 application server. Self Provisioning Portal (SPP) The SMP includes an optional component called the Self Provisioning Portal (SPP). The SPP is a Web site that allows customers to perform selected tasks, including: 4 Viewing and/or configuring specific gateway settings Security Management Portal Installation Guide SMP Virtual Portals Viewing and/or configuring specific user account details Viewing logs related to their gateways and user account Viewing reports for their gateways For information on performing these tasks in the SPP, see the Check Point Self Provisioning Portal User Guide. SMP administrators can choose whether to enable the SPP for a portal, and control which settings should be available for viewing and/or modifying in the SPP. For information, see the SMP Administrator Guide, Configuring the SPP. If desired, you can use the SMP API (Application Programming Interface) to develop your own SPP, customized for your business processes and needs. For information on using the SMP API, refer to the Check Point Security Management Portal Programmer Guide. SMP Virtual Portals An SMP virtual portal is a segment of the SMP that is used to manage a specific subset of gateways and users in the SMP. Each such portal acts as a standalone “virtual SMP”. Portal management is performed in the SMC. Users with sufficient permissions on a specific portal can log in to that portal via the SMC and view or manage that portal's settings only. In contrast, system administrators can view, add, remove, and manage all portals in the system. While each portal has separate settings and is used to manage different objects, all portals share certain global settings, such as firmware images, HTTP proxy settings, and SMSs. Only system administrators can view and manage these settings in the SMC. Event Logging Module (ELM) SMP has several built-in logging mechanisms. The Event Logging Module (ELM) is a remote logging mechanism that enables the SMS to collect log information and security reports from gateways. The security reports include attempted attacks, configuration changes, and system errors. The SMS sends the collected information to the log destinations specified in its logging policy: a Syslog server, Check Point's ELA server, the Windows Event Log, or the SMC. For information on configuring SMC logging, see the SMP Administrator Guide, Monitoring the SMP. Chapter 2: SMP Architecture 5 URL Filtering Module (UFM) You can configure a logging policy for each server group. For information on configuring a logging policy for a new server group, see the SMP Administrator Guide, Managing Servers and Server Groups. For information on configuring a logging policy for an existing server group, see the SMP Administrator Guide, Managing Servers and Server Groups. The SMP provides a reporting module that enables you to generate reports based on SMP logs. For information on using the reporting module, see Check Point Reporting Module on page 16. OPSEC ELA OPSEC ELA is an event logging protocol that allows logging to a Check Point management server, where the logs can be saved and later viewed by the Check Point log viewer, or exported to other applications using OPSEC LEA (Log Export API). For further information, see http://www.checkpoint.com/opsec/architect.htm. OPEN PLATFORM FOR SECURITY (OPSEC) An open, industry-wide alliance driven by Check Point that ensures interoperability between security products. Interoperability is achieved through a combination of published APIs, industry-standard protocols, and a high-level scripting language. OPSEC encourages partnerships in the areas of infrastructure (network products and services), framework (security products), and passport (application developers). Today, the OPSEC platform boasts the broadest operating system and network infrastructure support; over 350 partners have adopted its security integration interface. URL Filtering Module (UFM) The Check Point URL Filtering Module (UFM) enables Embedded NGX gateway users to protect their families or businesses from accessing objectionable Web sites. The URL filtering mechanism operates as follows: 1. For each HTTP request, the gateway extracts the requested URL. 2. If rule-based URL filtering is configured: a) The gateway sends a filtering request to the SMS. b) The SMS sends a response to the gateway, indicating whether the URL should be blocked. c) If access to the site is denied, continue at step 4. 6 Security Management Portal Installation Guide URL Filtering Module (UFM) 3. 4. If a UFP server is configured (either in addition to rule-based filtering, or alone): a) The gateway sends a categorization request for the URL to the SMS. b) The SMS obtains the categories from the OPSEC UFP-compliant URL filtering server. c) The SMS sends the category back to the gateway. d) The gateway determines whether access to this site should be denied or permitted, based on the user's configured preferences. If access to the site is denied, the gateway generates its own HTTP response, which informs the user that access has been denied and allows them to enter a password in order to override the URL filtering mode. The gateway maintains a cache with a list of recently checked URLs, so that filtering need not be performed for previously requested URLs. The UFM module works with any OPSEC UFM-compliant URL server. The Secuirty Content Filtering Server (SCS) represents a full URL filtering solution based on the Secure Computing SmartFilter system. This optional component is included on the Check Point CD. OPSEC UFP Chapter 2: SMP Architecture 7 Content Vectoring Module (CVM) OPSEC UFP (URL Filtering Protocol) is an OPSEC API that enables integration of third-party applications to categorize, and control access to, specific URL addresses. The UFP API has been adopted by a wide variety of content security vendors. Each customer can select from a list of categories that they want blocked. Figure 1: UFM Architecture Content Vectoring Module (CVM) The Content Vectoring Module (CVM) allows you to build "transparent proxies" that automatically divert selected traffic through a content filtering server, without requiring any configuration on the client side. CVM can be used to implement a transparent email antivirus and/or antispam mechanism. The solution is completely transparent to the customer. The customer does not need to change the configuration of their email client or install any software on their PC. 8 Security Management Portal Installation Guide Content Vectoring Module (CVM) The mechanism operates as follows: 1. The gateway encounters a POP3 email connection. 2. The gateway transparently diverts the connection to an OPSEC CVP-compliant antivirus server. 3. The CVP server checks the mail for malicious content and/or spam. 4. If a virus is detected, it is removed and replaced with a warning message. 5. If spam is detected, the email's Subject line is modified to indicate that it is suspected spam. The user can create rules to divert such messages to a special folder. The CVM module works with any OPSEC CVP-compliant antivirus server. Antispam functionality is currently supported only by the Check Point Security Content Filtering Server. The Secuirty Content Filtering Server (SCS) represents a full antivirus solution based on the free, open-source ClamAV antivirus system, and a complete antispam solution based on the free Apache SpamAssassin. This optional component is included on the Check Point CD. Chapter 2: SMP Architecture 9 Content Vectoring Module (CVM) OPSEC CVP OPSEC CVP (Content Vectoring Protocol) is an OPSEC API that enables integration of third-party content security applications, such as antivirus software, with Check Point security products. The CVP API has been adopted by a wide variety of security vendors. Figure 2: CVM Architecture 10 Security Management Portal Installation Guide VStream Antivirus Signature Updates Service VStream Antivirus Signature Updates Service VStream Antivirus is an embedded stream-based antivirus engine based on Check Point Stateful Inspection and Application Intelligence technologies, that performs virus scanning at the kernel level. SMP allows centrally managing VStream Antivirus settings for each gateway, as well as providing automated virus signature updates. SMP automatically fetches signatures from the Check Point online update center and efficiently delivers them to gateways subscribed to the VStream signature updates service, ensuring that the gateways' security is always up-to-date, and the networks are always protected. VStream Antivirus differs from the Content Vectoring (CVM) subscription service in the following ways: CVM is centralized, redirecting traffic through the Service Center for scanning, while VStream Antivirus scans for viruses in the Embedded NGX gateway itself. CVM is specific to email, scanning incoming POP3 and outgoing SMTP connections only, while VStream Antivirus supports additional protocols, including incoming SMTP and outgoing POP3 connections. You can choose to implement CVM, VStream Antivirus, or both. VStream Antispam Service VStream Antispam is an embedded antispam engine that allows the user to define exactly which emails should be scanned for spam, as well as which antispam checks should be performed. SMP allows centrally managing VStream Antispam settings for each gateway. VStream Antispam differs from the Content Vectoring (CVM) subscription service in that CVM is centralized, redirecting traffic through the Service Center for scanning, while VStream Antispam scans for spam in the Embedded NGX gateway itself. You can choose to implement CVM, VStream Antispam, or both. Chapter 2: SMP Architecture 11 Load Balancing Module (LBM) Load Balancing Module (LBM) When enabled, the Load Balancing Module (LBM) causes all SMSs in a server group to constantly synchronize load information. If one SMS becomes overloaded, that server redirects part of its clients to a less loaded server in the group. If a gateway detects that an SMS is not responding, it automatically switches to a functional or less loaded server. For information on defining server groups and on setting the load-balancing configuration of a specific SMS, see the SMP Administrator Guide, Managing Servers and Server Groups. Dynamic VPN Service (DVPN) The Dynamic Virtual Private Network (DVPN) service allows the creation of VPN communities. By enabling DVPN for a community, you can quickly and easily create a VPN community with hundreds of gateways. The resulting VPN communities are fully meshed or star (hub-and-spoke) communities. For ultimate flexibility, these communities can be nested, enabling you to create advanced VPN topologies, such as a meshed community in which the members are star communities, or a star community in which the members are meshed communities. The DVPN service fully supports the use of dynamic IP addresses, and automatically updates all the gateways in the VPN community with the most recent IP addresses. The DVPN service also supports VPN-1 SecuRemote and VPN-1 SecureClient VPN clients. Remote and mobile users can use these clients to securely access community resources. 12 Security Management Portal Installation Guide Dynamic VPN Service (DVPN) The DVPN service supports using industry-standard X.509 digital certificates for secure Site-to-Site VPN communications, and includes a built-in Certificate Authority (CA) that automatically issues such certificates to all gateways. The service also supports using shared secrets for authentication, and configuring support for external certificate authorities. Figure 3: Full Mesh DVPN Architecture Chapter 2: SMP Architecture 13 Dynamic DNS Service (DDNS) Dynamic DNS Service (DDNS) Most Internet service providers (ISP) assign dynamic rather than static IP addresses to their subscribers. If a gateway has a dynamic IP address, then each time the gateway connects to the ISP, its IP address may change. This poses a problem if the gateway's owner wants to run a public server. The Dynamic Domain Name System Service (DDNS) solves this problem by allowing you to assign a domain name to a gateway. The DDNS service constantly checks for changes to the gateway's IP address and updates the mapping of domain name to IP address accordingly. For example, if the SMP is registered in the worldwide DNS as the owner of the domain “mycompany.com”, and the DDNS service is enabled for a gateway named “office”, then the gateway will be accessible using the DNS name “office.mycompany.com”. Each time the gateway's IP address changes, the DDNS service will map this DNS name to the new IP address, so that the gateway is always accessible. The DDNS service resolves the Internet IP address of SMSs, as well, so you can assign domain names to SMSs. 14 Security Management Portal Installation Guide Dynamic DNS Service (DDNS) The DDNS service supports email address resolving (DNS MX Records), allowing you to assign email addresses to your customers under their own domain. For example, if you define the mail server for the gateway named “office” to be “mail.myisp.com”, then whenever someone sends email to an address that ends with “@office.mycompany.com”, the mail will be sent to the mail server “mail.myisp.com”. Figure 4: DDNS Architecture Chapter 2: SMP Architecture 15 Check Point Reporting Module Check Point Reporting Module The Check Point reporting module is an SMP service that allows you to create detailed security reports from Embedded NGX gateway logs. The reports include information about blocked attacks, detected viruses, filtered Web sites, and more, graphically demonstrating the value of the Embedded NGX firewall and the additional managed services you provide to your customers. You can configure the Check Point reporting module to automatically generate reports at specific intervals and to automatically email those reports to customers and/or SMP administrators. The reports are HTML-based and can be extensively customized in the SMC, by using a simple template. 16 Security Management Portal Installation Guide Vulnerability Scanning Service (VSS) Vulnerability Scanning Service (VSS) The Vulnerability Scanning Service (VSS) allows you to scan networks for security vulnerabilities, and to generate detailed vulnerability scanning reports. The reports include information about identified security vulnerabilities, a list of open TCP and UDP ports, and a pie chart representing the breakdown of detected vulnerabilities by severity, enabling subscribers to improve their networks' security, and demonstrating to non-subscribers the need for a Embedded NGX firewall. You can configure the VSS module to automatically generate vulnerability scanning reports at specific intervals and to automatically email those reports to customers and/or SMP administrators. The reports are HTML-based and can be extensively customized in the SMC, by using a simple template. VSS requires the Nessus or OpenVAS vulnerability scanner, which can be downloaded for free from http://www.nessus.org or http://www.openvas.org. The vulnerability scanner must be installed separately from the SMP on a Linux server. Be sure to read the scanner terms of use on the relevant Web site. Chapter 2: SMP Architecture 17 Vulnerability Scanning Service (VSS) Chapter 3 Installation Schemes SMP supports a variety of installation schemes, for ultimate flexibility and convenience. This chapter presents a few of the installation schemes supported by SMP. This chapter includes the following topics: Basic Installation ........................................................................................ 20 SMS High Availability Installation ............................................................ 21 SMS High Availability with Load Balancing Installation .......................... 24 Multiple Portals Installation .......................................................................25 Chapter 3: Installation Schemes 19 Basic Installation Basic Installation In the basic installation scheme, one SMP is installed, and all of its components are installed on a single machine, as shown in the figure below. Only one SMP virtual portal is defined in the SMC. Figure 5: Basic Installation Scheme 20 Security Management Portal Installation Guide SMS High Availability Installation SMS High Availability Installation In order to guarantee the ongoing operation of both the customer's managed services and the service provider's daily operations, a functional SMS must be available at all times. The following options require an SMS: Configuration updates and provisioning Remote management Remote logging CVM UFM DDNS Dynamic VPN Note: To provide DDNS service with no single point of failure, you must register at least two SMSs as the DNS servers for your domain. Note: Normal firewall and VPN operation do not require the gateway to be connected to an SMS server. Chapter 3: Installation Schemes 21 SMS High Availability Installation In order to ensure that a functional SMS is available at all times, you can implement the high availability installation scheme shown in the figure below. Figure 6: High Availability Installation Scheme This installation scheme requires that you replicate your database, so that if the primary database fails, the SMP will continue to function using the secondary database. The high availability installation scheme ensures that an SMS will always be available. For information on database replication, see the SMP Administrator Guide, Database Maintenance. For information on setting up this installation scheme, see the SMP Administrator Guide, Configuration Workflows. 22 Security Management Portal Installation Guide SMS High Availability Installation Note: For full redundancy, perform a Typical Primary SMP and a Typical Secondary SMP installation on two different machines, then configure the SMC on the primary server in active mode and the SMC on the secondary server in standby mode. If the primary server fails: The SMS on the secondary server automatically takes over the gateways from the SMS on the primary server. The administrator must manually change the mode of the SMC on the secondary server from "standby" to “active”. There must be exactly one active SMC at any given time. For information on configuring the SMC's mode, see Editing the SMC Configuration File on page 53. If desired, you can divide the gateways into geographical regions for improved scalability and SMS availability. See the figure below. Figure 7: High Availability Installation Scheme with Regional Divisions For information on setting up this installation scheme, see the SMP Administrator Guide, Configuration Workflows. Chapter 3: Installation Schemes 23 SMS High Availability with Load Balancing Installation SMS High Availability with Load Balancing Installation If you have a heavily-loaded system with thousands of gateways, it is recommended to use the High Availability with Load Balancing installation scheme. This installation scheme is identical to the High Availability installation scheme, with the following exception: you must enable the LBM option for the server group. This ensures that gateways are automatically assigned to the least-loaded SMSs. (In the High Availability installation scheme, on the other hand, a gateway is only transferred to another server when its original SMS shuts down or fails.) For further information on LBM and load balancing, see Load Balancing Module (LBM) on page 12. For information on setting the load-balancing configuration of a server group, see the SMP Administrator Guide, Managing Servers and Server Groups. For information on setting up this installation scheme, see the SMP Administrator Guide, Configuration Workflows. Note: For full redundancy, perform a Typical Primary SMP and a Typical Secondary SMP installation on two different machines, then configure the SMC on the primary server in active mode and the SMC on the secondary server in standby mode. If the primary server fails: The SMS on the secondary server automatically takes over the gateways from the SMS on the primary server. The administrator must manually change the mode of the SMC on the secondary server from "standby" to “active”. There must be exactly one active SMC at any given time. For information on configuring the SMC's mode, see Editing the SMC Configuration File on page 53. Note: It is not necessary to install the same number of LDAP servers as SMSs. If, for example, you have six SMSs, you can install two replicated LDAP servers and connect three SMS servers to each. See the figure below. 24 Security Management Portal Installation Guide Multiple Portals Installation Figure 8: High Availability with Load Balancing Installation For information on setting up this installation scheme, see the SMP Administrator Guide, Configuration Workflows. Multiple Portals Installation In the Multiple Portals installation scheme, you add multiple SMP virtual portals on the SMP. ForThis example, ISP with multiple resellers an SMP virtual portal for each reseller. allowsan saving on hardware, software,can andinstall ongoing maintenance. Only one SMS is installed, and it handles gateways for all of the SMP virtual portals. In order for a gateway connect to the relevant SMP virtual portal, the gateway must use its fully qualified ID, <gateway ID>.<portal name>, when connecting to the Service Center. Note: If desired, you can configure the SMS with multiple IP addresses. Furthermore, you can associate each IP address with a different "default" SMP virtual portal. When a gateway uses only its gateway ID (instead of its fully qualified ID) to connect to the Service Center, the default portal name is appended to the gateway ID automatically (<gateway ID>.<default portal name>), and the Chapter 3: Installation Schemes 25 Multiple Portals Installation gateway is connected to the default portal. Note: For full redundancy, perform a Typical Primary SMP and a Typical Secondary SMP installation on two different machines, then configure the SMC on the primary server in active mode and the SMC on the secondary server in standby mode. Add the desired SMP virtual portals via the active SMC. If the primary server fails: The SMS on the secondary server automatically takes over the gateways from the SMS on the primary server. The administrator must manually change the mode of the SMC on the secondary server from "standby" to “active”. All of the SMP virtual portals will then be accessible via the SMC on the secondary server. There must be exactly one active SMC at any given time. For information on configuring the SMC's mode, see Editing the SMC Configuration File on page 53. For information on setting up this installation scheme, see the SMP Administrator Guide, Configuration Workflows. 26 Security Management Portal Installation Guide System Requirements Chapter 4 Preparing for SMP Installation This chapter includes the following topics: System Requirements ................................................................................ 27 Tips for Capacity Planning ........................................................................ 28 Installing a Directory Service .................................................................... 31 Freeing Ports .............................................................................................. 32 System Requirements The SMP machine must meet the requirements listed in the table below. In addition, the machine's domain name must be configured. Table 1: System Requirements Item Requirement OS Microsoft Windows 2000 Server SP4 / Microsoft Windows 2003 Server SP2 / Microsoft Windows 2008 Server CPU Pentium-4 2.8 GHz or higher Memory 1 GB minimum Free disk space 2 GB minimum File system NTFS NIC 100Mbps Chapter 4: Preparing for SMP Installation 27 Tips for Capacity Planning Tips for Capacity Planning When deciding what capacity to provide, consider the following factors: The number of gateways The NOC Internet link's bandwidth and network latency The number of SMSs you intend to install The load on the SMS can be affected by several configuration settings: You can use the SMC to increase or decrease the interval in which the gateways poll for their setup (the Setup Interval) according to the available bandwidth of your NOC and the expected rate of changes. For information on changing this interval, see the SMP Administrator Guide, Managing Servers and Server Groups. The server CPU requirements depend on the chosen encryption method. If UFM will be enabled: The network bandwidth consumption depends on amount of user Web surfing. Low latency line is important for good user experience. Gateways cache responses to minimize the overhead. Take peak usage times into account. If CVM will be enabled: 28 The network bandwidth consumption depends on amount of concurrent email downloads. Users' emails are routed through the SMS. Take peak usage times into account. Security Management Portal Installation Guide Tips for Capacity Planning If DVPN will be enabled: Usually network bandwidth consumption is not large as large for CVM and UFM. The server answers revocation checking requests, sends updates on changed dynamic IP addresses, and distributes the VPN topology and settings of gateways in the community to all community members. If user authentication is enabled for a community, then gateways in the community consult the server when authenticating user logins. The gateways cache the results of user login checking requests and revocation checking requests. If you are managing very large communities containing hundreds of gateways or more, and the gateways' IP addresses change frequently, there may be a lot of traffic due to updating the dynamic IP addresses table in the community members each time an IP address changes. You can increase performance by making the revocation checking interval longer. This allows gateways to cache revocation checking responses for a longer amount of time and therefore reduces traffic, but it also increases the amount of time until all gateways know that a gateway's certificate was revoked. If DDNS will be enabled: Usually network bandwidth consumption is not large. You can tune the DNS caching parameters to reduce the amount of traffic. DNS resolution for gateways with dynamic IP addresses are usually much more demanding than DNS resolution for gateways with static IP addresses, because the DNS clients cache the dynamic IP address resolution results for a shorter amount time than static IP address resolution results. You can control these amounts of time, by configuring the Time to Live parameters in the SMC. See the SMP Administrator Guide, Configuring General SMP Settings. Chapter 4: Preparing for SMP Installation 29 Tips for Capacity Planning If logging and reporting will be enabled: You can increase or decrease the logging interval to suit the available bandwidth of your NOC and the expected rate of events. If the bandwidth is insufficient, some events might be lost. Each gateway sends at most one packet each logging interval. Each packet can contain up to 100 log messages. Log storage can consume a lot of disk space. Old log files can be automatically erased or compressed to save disk space. For more information, see the SMP Administrator Guide, Monitoring the SMP. To reduce log storage space, you can configure the server group log policy to filter out log messages of low importance. See the SMP Administrator Guide, Managing Servers and Server Groups. If Firmware Updates or the VStream Antivirus signature updates service will be enabled: You can limit bandwidth consumption by setting the Concurrent Downloads Limit in the SMS's Servers > Server > Edit page Configure tab's Advanced node. Lowering this value will reduce the bandwidth consumption, but make the updating process slower. See the SMP Administrator Guide, Managing Servers and Server Groups. If the Vulnerability Scanning service will be enabled: 30 Vulnerability scanning consumes large amount of memory. If you enable this feature, it is recommended to use more RAM than the minimum requirements. Vulnerability scanning consumes a large amount of network bandwidth during the scanning operation. You can schedule vulnerability scanning to occur during periods of low network activity. See the SMP Administrator Guide, Using the Vulnerability Scanning Service. You can limit the bandwidth consumption by setting the System > Vulnerability Scan page Server tab's Scan up to and Perform up to parameters in the VSS settings. Lowering these values will reduce the bandwidth consumption, but make the scanning slower. See the SMP Administrator Guide, Using the Vulnerability Scanning Service. Security Management Portal Installation Guide Installing a Directory Service Installing a Directory Service You can install SMP components with either Microsoft's Active Directory or SunONE Directory Server 5.1. You must install the desired directory service before installing the SMP. For information on installing Active Directory, see the following documentation: http://support.microsoft.com/default.aspx?scid=kb;en-us;324753 http://support.microsoft.com/default.aspx?scid=kb;en-us;318340 http://support.microsoft.com/default.aspx?scid=kb;en-us;308196&sd=tech Note: SunONE Directory Server must be installed on an NTFS partition. Chapter 4: Preparing for SMP Installation 31 Freeing Ports Freeing Ports Many servers are pre-installed with management software that might collide with the SMP installation. Before installing an SMP component, you must check that the appropriate port is free and that no other service is bound to it. The following table lists the ports used by each SMP component. To verify that the ports are free, use the shell command: netstat -a Table 2: SMP Ports This SMP component… Uses these ports… Microsoft Active Directory 389 TCP SunONE Directory Server 5.1 389 TCP, 12345 TCP CVP 25 TCP (SMTP), 110 TCP (POP3), 18181 TCP UFP 18182 TCP SMS 9281, 9282 UDP, 9283 TCP ELA 18187 TCP DDNS 53 UDP, 53 TCP DVPN None 32 Security Management Portal Installation Guide Freeing Ports Chapter 5 Installation This chapter contains all the information necessary to install the following components: SMP components: Security Management Center (SMC) Self Provisioning Portal (SPP) Secuirty Management Server (SMS) Secuirty Content Filtering Server (SCS) Third-party components: SunONE Directory Server 5.1 Trend Micro InterScan VirusWall CVP Server Aladdin eSafe Gateway CVP Server 4.0 Computer Associates eTrust CVP Server 7.1 SurfControl SuperScout Web Filter for Check Point FireWall-1 (2.0, 2.1) SurfControl Web Filter 5.0 Websense Enterprise SecureComputing SmartFilter FireWall-1 UFP Server Note: The Security Content Filtering Server (SCS) represents a full antivirus, antispam, and URL filtering solution. If you choose to use it, you must purchase a license from Check Point. For more information on the SCS, see Configuring the Security Content Filtering Server on page 73. Note: It is possible to install more than one CVP server on the same machine. To do this, use different ports or bind IP addresses for each CVP server. For information on configuring these parameters, see Configuring the Secuirty Content Filtering Server on page 73. This chapter includes the following topics: Installing SMP ........................................................................................... 35 Chapter 5: Installation 33 Freeing Ports Uninstalling SMP ...................................................................................... 45 Upgrading the SMP ................................................................................... 46 Backing Up the SMP Installation .............................................................. 50 Restoring the SMP Installation .................................................................. 51 Editing the SMC Configuration File .......................................................... 53 Editing the SMS INI File ........................................................................... 58 Configuring the SMS to Ignore Disabled Gateways .................................. 62 34 Security Management Portal Installation Guide Installing SMP Installing SMP Note: Before installing SMP components, you must log on to the system using administrator credentials. Note: Full installation can take up to 20 or 30 minutes. Note: It is recommended to connect the computer to the Internet before starting installation. If no connection is available during installation, all components will be installed, but all Internet updates (such as SCS and Web Filtering updates, VStream Antivirus updates, and so on) will be fetched later, when an Internet connection is established. To install SMP 1. Run the installer setup.exe, located under the windows directory on the Check Point CD. The following things happen: 2. The Preparing to Install… window opens. The Welcome window appears. Click Next. The License Agreement window appears. 3. Read the License Agreement carefully, and click Yes. The Choose Destination Location dialog box appears. 4. Browse to the desired destination directory using the Browse button. 5. Click Next. The Setup Type dialog box appears. 6. Select the desired setup type, based on the installation scheme you want to implement. See Installation Schemes on page 19 for information on installation schemes. Chapter 5: Installation 35 Installing SMP For information on restoring the SMP from a backup file, see Restoring the SMP Installation on page 51. 7. Click Next. 8. Do one of the following: If you chose Typical Primary, continue at Installing a Typical Primary SMP on page 36. If you chose Typical Secondary, continue at Installing a Typical Secondary SMP on page 38. If you chose Secuirty Management Server, continue at Installing an SMS on page 40. If you chose Secuirty Content Filtering Server, continue at Completing Installation on page 41. Installing a Typical Primary SMP If you chose Typical Primary, the Setup Type dialog box appears. 1. To install the SCS, click Yes. 2. Click Next. The following things happen: 3. If there is more than one IP address installed on this machine, the Select SMP IP Address dialog box appears. Do the following: 1) From the Select IP drop-down list, select the IP address on which you want to install the SMP. The list includes all IP addresses configured on this machine. 2) Click Next. A second Setup Type dialog box appears. Choose the directory service you want to use. Note: If you choose to use Active Directory, a Check Point schema for Active Directory will be installed. If you choose to use the SunONE Directory Server on this machine, a Check Point schema for SunONE Directory Server will be installed. 36 Security Management Portal Installation Guide Installing SMP Note: If you choose to use Active Directory, you must perform the Typical Primary installation on the Windows 2003 schema master. 4. Click Next. A message box appears asking you whether the directory service you chose is installed locally. 5. Do one of the following: If the directory service you chose is not installed locally, click No. The Primary Database Information dialog box appears. Do the following: 1) In the Host field, type the host name or IP address of the machine on which the primary database server is installed. 2) In the Port field, type the port number of the machine on which the primary database server is installed. 3) Click Next. If the directory service you chose is installed locally, click Yes. A second Primary Database Information dialog box appears. Note: If you chose Active Directory, the default values in this dialog box are identical to the default values used during Active Directory installation. If you did not change these values when you installed Active Directory, do not change them in this dialog box. 6. In the Domain field, type the primary database server's domain path. 7. In the User field, type the Active Directory administrator's DN or the SunONE Directory Server database administrator's username, depending on which directory service you chose. 8. Click Next. A third Primary Database Information dialog box appears. 9. In the field(s) provided, type the Active Directory administrator's password, or the SunONE Directory Server privileged user's password, depending on which directory service you chose. 10. Click Next. Chapter 5: Installation 37 Installing SMP The Secondary Database Information dialog box appears. 11. To use a secondary database, do the following: In the Host field, type the host name or IP address of the machine on which the secondary database server is installed. If you do not have a secondary database, leave this field blank. b. In the Port field, type the port number of the machine on which the secondary database server is installed. 12. Click Next. a. The Verify Your Selection dialog box appears. Continue at Completing Installation on page 41. Installing a Typical Secondary SMP If you chose Typical Secondary, the Setup Type dialog box appears. 1. To install the SCS, click Yes. 2. Click Next. The following things happen: 3. If there is more than one IP address installed on this machine, the Select SMP IP Address dialog box appears. Do the following: 1) From the Select IP drop-down list, select the IP address on which you want to install the SMP. The list includes all IP addresses configured on this machine. 2) Click Next. A second Setup Type dialog box appears. Choose the directory service you want to use. 4. Click Next. A message box appears asking you whether the directory service you chose is installed locally. 5. Do one of the following: 38 If the directory service you chose is not installed locally, click No. Security Management Portal Installation Guide Installing SMP If the directory service you chose is installed locally, click Yes. The Primary Database Information dialog box appears. 6. In the Host field, type the host name or IP address of the machine on which the primary database server is installed. 7. In the Port field, type the port number of the machine on which the primary database server is installed. 8. Click Next. A second Primary Database Information dialog box appears. Note: If you chose Active Directory, the default values in this dialog box are identical to the default values used during Active Directory installation. If you did not change these values when you installed Active Directory, do not change them in this dialog box. 9. In the Domain field, type the primary database server's domain path. 10. In the User field, type the Active Directory administrator's DN or the SunONE Directory Server database administrator's username, depending on which directory service you chose. 11. Click Next. A third Primary Database Information dialog box appears. 12. In the field(s) provided, type the Active Directory administrator's password, or the SunONE Directory Server privileged user's password, depending on which directory service you chose. 13. Click Next. The following things happen: If the directory service you chose is not installed locally, the Secondary Database Information dialog box appears. To use a secondary database, do the following: 1) In the Host field, type the host name or IP address of the machine on which the secondary database server is installed. If you do not have a secondary database, leave this field blank. 2) In the Port field, type the port number of the machine on which the secondary database server is installed. Chapter 5: Installation 39 Installing SMP 3) Click Next. The Verify Your Selection dialog box appears. Continue at Completing Installation on page 41. Installing an SMS If you chose Secuirty Management Server, the Setup Type dialog box appears. 1. To install the SCS, click Yes. 2. Click Next. A second Setup Type dialog box appears. 3. Choose the directory service used for the SMP. 4. Click Next. The Primary Database Information dialog box appears. 5. In the Host field, type the host name or IP address of the machine on which the primary database server is installed. 6. In the Port field, type the port number of the machine on which the primary database server is installed. 7. Click Next. A second Primary Database Information dialog box appears. Note: If you chose Active Directory, the default values in this dialog box are identical to the default values used during Active Directory installation. If you did not change these values when you installed Active Directory, do not change them in this dialog box. 8. In the Domain field, type the primary database server's domain path. 9. In the User field, type the Active Directory administrator's DN or the SunONE Directory Server database administrator's username, depending on which directory service you chose. 10. Click Next. A third Primary Database Information dialog box appears. 40 Security Management Portal Installation Guide Installing SMP 11. In the field(s) provided, type the Active Directory administrator's password, or the SunONE Directory Server privileged user's password, depending on which directory service you chose. 12. Click Next. The Secondary Database Information dialog box appears. 13. To use a secondary database, do the following: In the Host field, type the host name or IP address of the machine on which the secondary database server is installed. If you do not have a secondary database, leave this field blank. b. In the Port field, type the port number of the machine on which the secondary database server is installed. 14. Click Next. a. The Verify Your Selection dialog box appears. Continue at Completing Installation on page 41. Completing Installation The Verify Your Selection dialog box appears. The Current Settings area displays the installation type you chose. Note: Be sure to read the summary before continuing! 1. Click Next. The selected SMP components are installed. Note: The installation process requires user input, so stay by the computer during installation. During installation, the following things happen in the order below: The Setup Status progress window appears and tracks the progress of installation. The log file install.log is created in the Check Point directory and written to throughout installation. This file contains error messages generated Chapter 5: Installation 41 Installing SMP during the installation process, as well as all the system commands carried out during the installation process and their output. This file also contains all the passwords you entered during installation, so you may want to delete all passwords before sending it to someone else. If you chose Typical Primary or Secondary setup, the SMC configuration file INFO.properties is created under $SMP_HOME\Tomcat\webapps\SMC\WEB-INF, where $SMP_HOME is the SMP installation directory. For information on editing the SMC configuration file, see Editing the SMC Configuration Files on page 53. If you chose to install the SCS, the SCS configuration file SCS.ini is created under $SMP_HOME\conf, where $SMP_HOME is the SMP installation directory. For information on configuring the SCS, see Configuring the Check Point Content Filtering Server on page 73. If you chose to install the SCS only, the SMP 8.1 Installation Complete dialog box appears. Continue at step 5. If you chose Typical Primary setup, the SMP configuration dialog box appears. Do the following: 1) In the SMTP field, type the SMTP server to be used for sending emails from the SMP. 2) In the Mail field, type the customer support email address. This address appears in all emails sent by the SMP. Note: You can change these settings in the SMC, using the procedure the SMP Administrator Guide, Configuring General SMP Settings. 3) Click Next. The SMP Admin User information dialog box appears. 4) In the Login field, type the SMC super user's login for logging in to the SMC. 5) In the Mail field, type the SMC super user's email address. 6) Click Next. A second SMP Admin User information dialog box appears. 42 Security Management Portal Installation Guide Installing SMP 7) In the Password and Confirm password fields, type a password for the SMC super user. Note: The password must be at least seven characters long. 2. 8) Click Next. If you chose Typical Secondary setup or Secuirty Management Server setup, the SMC Information dialog box appears. Do the following: 1) In the Host field, type the hostname or IP address of the SMC. 2) Click Next. The Management Server Group dialog box appears. The screen below is relevant for Typical Primary setup. If you chose another setup type, this screen appears as follows: In the Server field, type a name for the new SMS. The default SMS name is the name of this machine. 3. In the Group field, do one of the following: If you chose Typical Primary setup, type a name for the server group that will be added to the SMC. If you chose another setup type, select the desired existing server group. The new SMS will belong to this group. The default server group name is “group1”. Note: For information on setting server and server group names, see the SMP Administrator Guide, Managing Servers and Server Groups. 4. Click Next. The SMP 8.1 Installation Complete dialog box appears, and you are asked whether you want to reboot your computer. 5. Click Yes, I want to restart my computer now. 6. Click Finish. If you chose a Typical Primary or Secondary setup, a free 90-day evaluation license for 10 gateways is installed, and the “This product is not licensed” Chapter 5: Installation 43 Installing SMP message will appear on the SMC Welcome page. The license is valid for all SMP virtual portals. For information on buying a license, see the SMP Administrator Guide, Managing SMP Licenses. Note: If you chose to use SunONE, you must replicate the database. For information, see Replicating Databases on page 71. Note: See the SMP Administrator Guide, Managing Servers and Server Groups for information on configuring the SMS and its server group. 44 Security Management Portal Installation Guide Uninstalling SMP Uninstalling SMP Note: Before uninstalling SMP components, you must log on to the system using administrator credentials. To uninstall SMP 1. Do one of the following: Run the installer setup.exe, located under the windows directory on the Check Point CD, or In the Add/Remove Programs window, select Check Point Security Management Portal 8.1, and click Change/Remove. The following things happen: 2. The Preparing to Install… window opens. A confirmation message appears asking whether you want to uninstall the SMP. Click OK. The Uninstall Options dialog box appears. 3. Make sure that the Completely remove SMP data from database check box is selected. 4. To remove SMP installation logs, select the Completely remove SMP installation logs check box. 5. Click Next. Another confirmation message appears. 6. Click OK. The following things happen: If you are uninstalling a Typical Secondary installation or Security Management Server installation, the SMC Information dialog box appears. Do the following: 1) In the Host field, type the hostname or IP address of the SMC. 2) Click Next. Chapter 5: Installation 45 Upgrading the SMP The Setup Status progress window appears. All Check Point components are uninstalled, along with their configuration files. Note: The Check Point schema for your directory service is not removed. 7. The SMP 8.1 Uninstall Complete dialog box appears, and you are asked whether you want to reboot your computer. Click Yes, I want to restart my computer now. 8. Click Finish. Upgrading the SMP You can upgrade existing SMP components to SMP 8.1, while retaining the data currently stored in the Check Point database. Note: Before upgrading to SMP 8.1: 46 The SMP 8.1 installer allows upgrading from SMP 8.0 only. To migrate from earlier versions of SMP, first upgrade to SMP 8.0, then upgrade from SMP 8.0 to SMP 8.1 using the SMP 8.1 installer. Upgrading to SMP 8.1 requires a new license key. To obtain a new license key, contact Check Point support at http://www.checkpoint.com/support (http://supportcenter.checkpoint.com). When upgrading from an installation with multiple SMP virtual portals (instances), only a single server group can be defined. Before running the SMP 8.1 installer, make sure that only one server group is defined. Security Management Portal Installation Guide Upgrading the SMP Note: After upgrading to SMP 8.1: All log messages are cleared. All customized report templates are reset to the new default settings. A new global administrator account is created. All administrators defined in the earlier installation are converted to users. These users’ administrative roles and permissions are preserved. If the original installation had multiple SMP virtual portals (instances), the SMP 8.1 global configuration is taken from the first SMP virtual portal. In SMP versions older than 5.0, the SMS's bind address was set to "Any", by default. In order to add SMP virtual portals after upgrading the SMP, you must set the SMS's bind address to a specific server address. For information on setting the bind address, see the SMP Administrator Guide, Managing Servers and Server Groups. Note: If multiple SMP installations are installed on Active Directory, you must perform the upgrade on the schema master first. Upgrading the SMP on the Current Server To upgrade the SMP on the server where it is currently installed 1. 2. Run the installer setup.exe, located under the windows directory on the Check Point CD. The Preparing to Install… window opens. A message box asks you whether you want to upgrade SMP. Click Yes. The Welcome screen appears. 3. Click Next. The License Agreement window appears. 4. Read the License Agreement carefully, and click Yes. 5. Click Next. The Primary Database Information dialog box appears. This screen differs depending on the database type that is installed. 6. In the Domain field, type the primary database server's domain path. Chapter 5: Installation 47 Upgrading the SMP 7. In the User field, type the Active Directory administrator's DN or the SunONE Directory Server database administrator's username, depending on which directory service is installed. 8. Click Next. A second Primary Database Information dialog box appears. 9. In the field(s) provided, type the Active Directory administrator's password, or the SunONE Directory Server privileged user's password, depending on which directory service is installed. 10. Click Next. The Secondary Database Information dialog box appears. 11. To use a secondary database, do the following: In the Host field, type the host name or IP address of the machine on which the secondary database server is installed. If you do not have a secondary database, leave this field blank. b. In the Port field, type the port number of the machine on which the secondary database server is installed. 12. Click Next. a. The Verify Your Selection dialog box appears. 13. Click Next. The following things happen: The Setup Status progress window appears and tracks the progress of the upgrade process. Warning: Do not click Cancel until the upgrade is complete! 48 The SMP components that were installed prior to upgrade are reinstalled to the same directory. No new components are installed. The log file install.log is created in the Check Point directory and written to throughout installation. This file contains error messages generated during the installation process, as well as all the system commands carried out during the installation process and their output. This file also contains all the Security Management Portal Installation Guide Upgrading the SMP passwords you entered during installation, so you may want to delete all passwords before sending to someone else. The SMC configuration file INFO.properties is created under $SMP_HOME\Tomcat\webapps\SMC\WEB-INF, where $SMP_HOME is the SMP installation directory. If SCS was installed, the SCS configuration file SCS.ini is created under $SMP_HOME\conf, where $SMP_HOME is the SMP installation directory. Note: For information on editing the SMC configuration file, see Editing the SMC Configuration Files on page 53. For information on configuring the SCS, see Configuring the Security Content Filtering Server on page 73. All SMP 7.0 components are uninstalled. The SMP 8.1Installation Complete dialog box appears, and you are asked whether you want to reboot your computer. 14. Click Yes, I want to restart my computer now. 15. Click Finish. If SCS was installed: The SCS shortcuts, the file readme.txt, and the ClamAV and SpamAssassin licenses are added to the Windows Start menu, under Programs\Check Point\SCS. The folder ClamAV is added to the Windows Start menu, under Programs. Upgrading the SMP on a Different Server To upgrade the SMP on a different server 1. On the server where SMP 8.0 is installed, back up the SMP installation. See Backing Up the SMP Installation on page 50. 2. On the new server, restore the SMP installation from the backup file created in the previous step. See Restoring the SMP Installation on page 51. The installer automatically upgrades the SMP 8.0 installation to SMP 8.1. Chapter 5: Installation 49 Backing Up the SMP Installation Backing Up the SMP Installation You can backup the SMP installation to a *.bak file. You can then use the backup file to restore the SMP installation as needed. For information on restoring the installation, see Restoring the SMP Installation on page 51. Note: This procedure explains how to back up all data for all SMP virtual portals via the command line. To backup this data via the SMC, see the SMP Administrator Guide, Backing Up and Restoring the SMP System Configuration. To export data for a specific SMP virtual portal only, see the SMP Administrator Guide, Database Maintenance. To back up the SMP 1. Open a command prompt. 2. Enter the following command: smp_backup destination_file [-y] [-L] For information on the command's flags, see the table below. For example, if you want to backup the SMP to the file backup.bak, enter the following command: smp_backup backup.bak All SMP virtual portals are backed up. Table 3: Backup SMP Virtual Portal Flags Flag Description destination_file The path to the destination backup file. -y Indicates that if the destination file already exists, it should be overwritten. -L Indicates that the log files should not be backed up. 50 Security Management Portal Installation Guide Restoring the SMP Installation Restoring the SMP Installation You can restore the SMP installation from a backup file. For information on creating a backup file, see Backing Up the SMP Installation on page 50. Note: This procedure explains how to restore all data for all SMP virtual portals. To import data for a specific SMP virtual portal, see the SMP Administrator Guide, Database Maintenance. To restore the SMP installation 1. If the SMP is installed on the computer where you want to perform the restore action, uninstall it using the procedure Uninstalling SMP from Windows. 2. Run the installer setup.exe, located under the windows directory on the Check Point CD. 3. The Preparing to Install… window opens. The Welcome window appears. Click Next. The License Agreement window appears. 4. Read the License Agreement carefully, and click Yes. The Choose Destination Location dialog box appears. 5. Browse to the desired destination directory using the Browse button. 6. Click Next. The Setup Type dialog box appears. 7. Select Restore from backup. 8. Click Next. The Select Backup File dialog box appears. 9. Browse to the desired destination directory using the Browse button. 10. Click Next. The following things happen in the order below: Chapter 5: Installation 51 Restoring the SMP Installation If there is more than one IP address installed on this machine, the Select SMP IP Address dialog box appears. Do the following: 1) From the Select IP drop-down list, select the IP address on which you want to install the SMP. The list includes all IP addresses configured on this machine. 2) Click Next. The Setup Type dialog box appears. 11. Choose the directory service you want to use. 12. Click Next. A message box appears asking you whether the directory service you chose is installed locally. 13. Do one of the following: If the directory service you chose is not installed locally, click No. The Primary Database Information dialog box appears. Do the following: 1) In the Host field, type the host name or IP address of the machine on which the primary database server is installed. 2) In the Port field, type the port number of the machine on which the primary database server is installed. 3) Click Next. If the directory service you chose is installed locally, click Yes. A second Primary Database Information dialog box appears. 14. In the Domain field, type the primary database server's domain path. 15. In the User field, type the Active Directory administrator's DN or the SunONE Directory Server database administrator's username, depending on which directory service is used. 16. Click Next. A third Primary Database Information dialog box appears. 52 Security Management Portal Installation Guide Editing the SMC Configuration File 17. In the field(s) provided, type the Active Directory administrator's password, or the SunONE Directory Server privileged user's password, depending on which directory service is used. 18. Click Next. The Secondary Database Information dialog box appears. 19. To use a secondary database, do the following: In the Host field, type the host name or IP address of the machine on which the secondary database server is installed. If you do not have a secondary database, leave this field blank. b. In the Port field, type the port number of the machine on which the secondary database server is installed. 20. Click Next. a. The Verify Your Selection dialog box appears. 21. Click Next. The following things happen in the order below: The Setup Status progress window appears and tracks the progress of installation. The SMP installation is restored. The SMP 8.1 Installation Complete dialog box appears, and you are asked whether you want to reboot your computer. 22. Click Yes, I want to restart my computer now. 23. Click Finish. Editing the SMC Configuration File You can change SMC settings after installation, by editing the SMC configuration file INFO.properties, located under $SMP_HOME\Tomcat\webapps\SMC\WEB-INF, where $SMP_HOME is the SMP installation directory. For information on this file's sections and parameters, refer to the table below. Chapter 5: Installation 53 Editing the SMC Configuration File Table 4: SMC Configuration File Parameters Set this parameter… To this value… For example… DB_URL The LDAP server's URL, with SunONE;ldap://demo.chec "SunONE;" or “AD;” added before it, kpoint.com: depending on the server type. 389/o=ldap.checkpoint.co m DB_USER DB_PASS The privileged user to use when cn=administrator,cn=users connecting to this server ,DC=smp1,DC=com The password to use when password1 connecting to this server SMC_TYPE The SMC's mode. This can be one of active the following: active standby DATETIME_FORMAT The format to use for displaying the MMMMM dd, yyyy date and time in the SPP. HH:mm:ss Use the following placeholders to indicate the desired time units: MMMMM = month dd = day yyyy = year HH = hours mm = minutes ss = seconds DATE_FORMAT 54 The format to use for displaying the MMMMM dd, yyyy Security Management Portal Installation Guide Editing the SMC Configuration File Set this parameter… To this value… For example… date in the SPP. Use the following placeholders to indicate the desired time units: MMMMM = month dd = day yyyy = year SYSTEM_MONITOR_INTER The interval (in minutes) at which the VAL system monitor collects information. REPORT_THRESHOLD The number of IP addresses to 20 5 include in the security reports' Top Attackers list. CONNECT_TO_SMS_USING Indicates whether to connect to the _NAT_IP SMS using NAT. 0 This can have the following values: 0 - The SMS is not behind a NAT device, or it is behind the same NAT device as the SMC. An IP address - The IP address of the NAT device behind which the SMS is located. REPORTER_MAX_LOGFILE The number of log files to open S concurrently during report 500 generation. Setting a higher value reduces report generation time but consumes more memory. Chapter 5: Installation 55 Editing the SMC Configuration File Set this parameter… To this value… For example… HIDE_INSTANCES Indicates whether to replace the list 1 of SMP virtual portals in the SMC Login page with a text box, in which the user must type the SMP virtual portal name. This can have the following values: UPDATES_URL 1 - Replace the list of portals with a text box. 0 - Show the list of portals. The URL from which to download https://updates.checkpoint updates to the SMP. .com/WebService/services /DownloadMetaDataServic e SESSION_IDLE_TIMEOUT_ The number of minutes after which MINUTES idle sessions are automatically timed 15 out. VSTREAM_INDEX_URL The URL from which to download http://sigcheck.checkpoint. VStream Antivirus signature com/vstream-siglist.txt updates. VSTREAM_SIGNATURES_B The URL from which to download http://avupdates.checkpoi ASE_URL updates to VStream Antivirus nt.com/ signature updates. ALLOW_REMOTE_API_ACC Indicates whether to allow remote ESS clients to access the SMP API. 0 This can have the following values: 56 1 - Allow remote clients to access the SMP API. Security Management Portal Installation Guide Editing the SMC Configuration File Set this parameter… To this value… For example… 0 - Allow SMP API access from the local host only. This is the default. CLIENT_LOGIN_FAILURE_T The amount of time in minutes that TL_MINS the SMC should list a gateway's status as "Client Login Failed", after the gateway failed to authenticate to the SMS. The default value is 5 minutes. Chapter 5: Installation 57 Editing the SMS INI File Editing the SMS INI File You can change advanced SMS settings and the LDAP server to which the SMS connects, by editing the SWManagementServer.ini file, which is located on the SMS machine under the directory $SMP_HOME\conf\, where $SMP_HOME is the SMP installation directory. For information on this file's sections and parameters, refer to the table below. Note: The SMS connects to the LDAP database in order to obtain gateway-specific information. Therefore, if you change the database login information, you must also update the SWManagementServer.ini file. Changing the Windows Server admin user usually changes the database login information as well. Table 5: SMS INI File Sections and Parameters Section Parameter Description Example DB URL The LDAP database's URL. "ldap://demo. Note: The LDAP is mandatory for the SMS checkpoint.com: startup, since the SMS reads its checkpoint.com" configuration from it. User 389/o=ldap. The LDAP administrator's user name. "cn=Directory Manager" BACKUP_DB Password The LDAP administrator's password. "checkpoint" URL The backup LDAP server's URL. "ldap://demo. checkpoint.com: 389/o=ldap. checkpoint.com" User 58 The user name of the backup LDAP "cn=Directory server administrator. Manager" Security Management Portal Installation Guide Editing the SMS INI File Section Parameter Description Example Password The password of the backup LDAP server "checkpoint" administrator. Server Uid The SMS server name. "demo1" MailProxy pop3_port The port used to listen for POP3 110 connections. smtp_port The port used to listen for SMTP 25 connections. Advanced sessions_purge The interval of time (in seconds) after _interval which the SMS will purge old sessions. db_reconnect The interval of time (in seconds) after _interval which the SMS will try to reconnect to the 10 20 LDAP, if the LDAP disconnects. ufp_reconnect The interval of time (in seconds) after _interval which the SMS will try to reconnect to the 30 UFP server, if the UFP server disconnects. cvp_reconnect The interval of time (in seconds) after _interval which the SMS will try to reconnect to the 30 CVP server, if the CVP server disconnects. cvm_connection The lifetime of a CVM connection (in _lifetime seconds). cvm_purge_ How often (in seconds) the SMS purges interval old CVM connections. Chapter 5: Installation 60 60 59 Editing the SMS INI File Section Parameter Description Example opsec_sessions The interval of time (in seconds) to keep 3 _keepalive an OPSEC session alive. swtp_rcv_buf The size (in bytes) of the SWTP receive 32000 buffer. swtp_snd_buf The size (in bytes) of the SWTP send 32000 buffer. min_lbm The minimum threshold percentage for _threshold load balancing. 10 If a server's load (the number of gateways handled) reaches or exceeds this percentage of the server's optimal load, then the load balancing mechanism is activated. cvp_idle_interval The interval of time (in seconds) after 15 which the SMS will send a keepalive message to the mail server during the mail scanning process, in order to avoid time-outs on the server side. cvp_client_idle The interval of time (in seconds) after _interval which the SMS will send a keepalive 15 message to the mail client during the mail scanning process, in order to avoid time-outs in the mail reader application. cvp_client_ The maximum number of times that the timeout_interval SMS will send keepalive message to the 600 mail client during the mail scanning 60 Security Management Portal Installation Guide Editing the SMS INI File Section Parameter Description Example process. drm_cache_max_ The maximum number of entries in the size DDNS cache. drm_cache The interval of time (in seconds) after _purge_interval which the DDNS service will purge old 1000 30 entries from its cache. GatewaysReacha Indicates whether the SMS should close ble the client session on a command timeout. false This can have the following values: true - The SMS will close the client session on a command timeout. false - The SMS will not close the client session on a command timeout. The default value is false. DisableIpLock Indicates whether to allow gateways with false a static IP address to connect from a different IP address. This can have the following values: true - Gateways with a static IP address can connect from a different IP address. false - Gateways with a static IP address cannot connect from a different IP address. The default value is false. certificate_refresh Chapter 5: Installation The interval of time (in seconds) after 60 61 Configuring the SMS to Ignore Disabled Gateways Section Parameter Description Example _interval which the SMS will check for a new certificate. Configuring the SMS to Ignore Disabled Gateways When you disable an SMP virtual portal, all gateways defined in that portal are considered disabled. Each time a disabled gateway attempts to connect to the SMS, the SMS sends an "Access Denied" log to the SMC. In order to prevent the SMS from sending numerous "Access Denied" logs to the SMC when a portal is disabled, you can configure the SMS to ignore disabled gateways. To configure an SMS to ignore disabled gateways In the SMS INI file, in the Advanced section, add the following line: ignore_disabled_gateways=true For information on editing the SMS INI file, see Editing the SMS INI File on page 58. 62 Security Management Portal Installation Guide Configuring the SMS to Ignore Disabled Gateways Chapter 6 Troubleshooting SMP installation failed. What should I do? The following events indicate that installation has failed: An error message appears during installation. The installer does not finish installing all the components. One or more SMP components do not work. In the Check Point directory, check the file install.log. This log file contains error messages generated during the installation process, as well as all the system commands carried out during the installation process, their output, and return calls. Send the file to customer support. I am having trouble contacting the SMC Web site. What should I do? If you have a Web caching server installed, disable caching of the SMC website in the server's configuration. An SMS does not start up. What should I do? In the SMC, in the System > Servers > Server > Edit page Configure tab's Status node, check that the Address field matches the server's actual IP address. If the server is configured behind a Network Address Translation (NAT) device, the NAT address should be configured in the General node. For information on viewing and configuring SMSs, see the SMP Administrator Guide, Managing Servers and Server Groups. On the SMS machine, verify that the SWManagementServer.ini file exists, and that the LDAP server user ID and password are configured correctly in the file. For further information, see the SMP Administrator Guide, Managing Servers and Server Groups. Chapter 6: Troubleshooting 63 Configuring the SMS to Ignore Disabled Gateways Restart the SMS from the command line, by doing the following: a. b. Enter the following command: sms_stop.bat Enter the following command: sms -confdir $SMP_HOME\conf where $SMP_HOME is the SMP installation directory. The SMC is working very slowly. What should I do? Check whether your LDAP server is being overloaded by several requests per second, using the performance monitoring tools provided with your LDAP server. If it is, you can reduce the user's setup interval. If you have many firmware files installed, delete some of them, as storing large files causes significant performance degradation of the LDAP server. I want to troubleshoot problems with a particular gateway. What should I do? In the gateway's Main > Gateways > Edit page's Services > Logging node, temporarily set the gateway's Send logs every field to a short interval (such as five seconds), so that when an event occurs that involves the gateway, you will be able to view the event log almost immediately. For information on configuring a gateway's Send logs every field, see the SMP Administrator Guide, Managing Service Plans and Gateways. For information on viewing logs, see the SMP Administrator Guide, Monitoring the SMP. When connecting to the Service Center, the following error message appears: "The gateway is already registered with a different gateway ID". What should I do? This error appears when the connecting gateway's MAC address is already registered in the Service Center's database under a different gateway name. This can happen in the following situations: The gateway's MAC address was loaded to the database by the Service Center operators. Sometime in the past, the gateway connected to the Service Center in the past and registered its MAC address. 64 Security Management Portal Installation Guide Configuring the SMS to Ignore Disabled Gateways To work around this problem, search the database for the gateway's MAC address and do one of the following: Delete the old gateway entry and reconnect the gateway to the Service Center. Delete the MAC address information from the gateway's entry and reconnect the gateway to the Service Center. I cannot log in to the SMC after changing the Active Directory password. What should I do? The SMP uses the Active Directory login credentials to access the LDAP database. Active Directory login credentials are stored when SMP is installed, but they are not dynamically updated when you change the Active Directory password. If you changed the Active Directory password, you must edit the following files with the correct credentials: $SMP_HOME\conf\SWManagementServer.ini $SMP_HOME\Tomcat\webapps\SMC\WEB-INF\info.properties $SMP_HOME is the SMP installation directory. Mail Antivirus scanning does not work. What should I do? If you provide Mail Antivirus services, and customers complain they cannot send or receive emails, check the following: Is the OPSEC CVP server software installed correctly? The software may offer a few installation options. Make sure that the software is actually installed in CVP mode. Refer to the installation documentation provided by the software vendor for more information. Is the OPSEC CVP server software licensed correctly? Make sure that you have a valid and working license for the OPSEC CVP server software. Is the SMP licensed correctly to provide Mail Antivirus services? The SMP must be licensed properly to provide Mail Antivirus services. See the SMP Administrator Guide, Managing SMP Licenses. Is the SMP behind a firewall? Open ports TCP 110 (POP3) and TCP 25 (SMTP) for incoming connections to the SMP. Is there a mail server installed on the same computer as the SMP? Chapter 6: Troubleshooting 65 Configuring the SMS to Ignore Disabled Gateways Remove any mail server software installed on the computer. I cannot generate security reports. What should I do? Examine the Check Point reporting module log file, located under $SMP_HOME\files\reports\reporter.log file, where $SMP_HOME is the SMP installation directory. 66 Security Management Portal Installation Guide Configuring the SMS to Ignore Disabled Gateways Chapter 7 Protecting the SMP behind a Firewall It is highly recommended to protect the SMP behind a firewall. In order for the system to operate properly, open the ports described in the table below. Note: In a full installation, the installer automatically installs all the SMP components (server, database, UFP extension and so on) on the same computer. The table below uses parentheses to distinguish between the different components. Table 6: Default SMP Ports Source Destination Default Ports Note Management Server Any 9281 UDP Gateway-Server (SMS) Any communication Management Server 9282 UDP (SMS) Any Gateway-Server communication Management Server HTTP, HTTPS (80, Self Provisioning (SPP) 443) Portal Mail Server SMTP (25) Management IP Management Server 9282 TCP address (SMC) (SMS) Management IP address (SPP, SMC) SMC-Server communication via SMSTP (SMS Transport Protocol) Administrator IP Management Server address (SMS) Chapter 7: Protecting the SMP behind a Firewall 9283 SMS Console port TCP 67 Configuring the SMS to Ignore Disabled Gateways Source Destination Default Ports Note Administrator IP Management Server HTTP, HTTPS (80, Administration SMC address (SMC) 443) Administrator IP Management IP 12345 address address (SunONE Only if SunONE Directory server is TCP LDAP Console) Any Management Server used 110 Needed only if POP3 (SMS) Management Server Any CVP is enabled 110 Needed only if POP3 (SMS) Any CVP is enabled Management Server 25 Needed only if SMTP (SMS) Management Server Any CVP is enabled 25 Needed only if SMTP (SMS) CVP is enabled Management Server Check Point Syslog 515 UDP Syslog port (SMS) Server Management Server ELA server 18187 TCP ELA CVP server 18181 TCP CVP UFP server 18182 TCP UFP (SMS) Management Server (SMS) Management Server (SMS) 68 Security Management Portal Installation Guide Configuring the SMS to Ignore Disabled Gateways Source Destination Default Ports Note Management Server DNS server 53 TCP and UDP DDNS (SMS) Chapter 7: Protecting the SMP behind a Firewall 69 Configuring the SMS to Ignore Disabled Gateways Chapter 8 Replicating Databases It is recommended that you replicate your database, so that if your main database fails, the SMP will continue to function, using the second database. In Active Directory, the recommended replication is to a second server in the same domain that also has Active Directory installed. Active Directory supports multi-master replication. For replication instructions for Active Directory, go to: http://www.microsoft.com/technet/prodtechnol/windowsserver2003/library/TechRef/13f61 9dc-ca0c-4c63-97be-bdb1a67f6f50.mspx For replication instructions for Active Directory 2000, go to: http://www.petri.co.il/how_to_install_active_directory_replica_on_w2k.htm For replication instructions for Active Directory 2003, go to: http://www.petri.co.il/how_to_install_active_directory_replica_on_windows_2003.htm If you are using SunONE Directory Server, you will need to configure the database replication. SunONE supports both single-master and multi-master replication. The recommended replication is multi-master replication to a second server. For replication instructions for SunONE Directory Server, go to: http://docs.sun.com/source/816-2670/replicat_new.htm#1100299 Chapter 8: Replicating Databases 71 Configuring the SMS to Ignore Disabled Gateways Chapter 9 Configuring the Secuirty Content Filtering Server The Check Point Secuirty Content Filtering Server (SCS) is an optional SMP component that represents a full antivirus and antispam solution based on the ClamAV antivirus system and Apache SpamAssassin, as well as a full UFP filtering solution based on the Secure Computing SmartFilter system. For information about the ClamAV antivirus system, surf to http://www.clamav.net. For information about Apache SpamAssassin, surf to http://spamassassin.apache.org. For information about Secure Computing SmartFilter, surf to http://www.securecomputing.com/index. The SCS can be installed using the procedure Installing SMP on page 35, and it requires a license. For information on purchasing a license from Check Point, see the SMP Administrator Guide, Managing SMP Licenses. For the ClamAV and SpamAssassin open-source licenses, see COPYRIGHT & TRADEMARKS. This appendix explains how to configure the SCS. This chapter includes the following topics: Configuring SCS General Settings ............................................................. 74 Configuring ClamAV Settings ...................................................................77 Configuring SpamAssassin Settings ........................................................... 78 Chapter 9: Configuring the Secuirty Content Filtering Server 73 Configuring SCS General Settings Configuring SCS General Settings To configure SCS general settings, edit the SCS configuration file SCS.ini, which is located under $SMP_HOME\conf, where $SMP_HOME is the SMP installation directory. For information on this file's sections and parameters, see the table below. Table 7: SCS INI File Sections and Parameters Section Parameter Description SCS BindAddr The IP address to which the listener binds. This can have the following values: A specific IP address 0.0.0.0 - All IP addresses of the machine The default is 0.0.0.0. CvpListenPort The port used to listen for incoming connections for CVP filtering. The default is 18181. UfpListenPort The port used to listen for incoming connections for URL filtering. The default is 18182. SpamMechanism The mechanism used to identify spam. This can have the following values: VirusMechanism 0 - Disable antispam support. 1 - Use SpamAssassin. The mechanism used to identify viruses. This can have the following values: 74 0 - Disable antivirus support. Security Management Portal Installation Guide Configuring SCS General Settings Section Parameter Description UfpMechanism 1 - Use ClamAV. The mechanism used to filter Web sites. This can have the following values: MsgFrom 0 - Disable Web Filtering support. 1 - Use SmartFilter. The name and address appearing in the From field of the virus notification email. MsgSubject The text appearing in the Subject field of the virus notification email. MsgSubjectVirusPrefix The prefix to the text appearing in the Subject field of the virus notification email. For example, if this parameter is set to "*****VIRUS*****" and the MsgSubject parameter is set to "Virus Blocked by SCS", the email's Subject field will display: "*****VIRUS*****Virus Blocked by SCS" MsgContentFile The name of the attached *.txt file containing the infected email. MsgCharSet The virus notification email's character set. VirusFolder The full path to the folder in which viruses are collected. ClamAV MaxVirusCount The maximum number of virus samples saved. ServerIP The IP address of the server running ClamAV. By default this is the same server as the SCS. Chapter 9: Configuring the Secuirty Content Filtering Server 75 Configuring SCS General Settings Section Parameter Description Note: If ClamAV is installed on another server, you can stop the Check Point Mail Antivirus service and direct the SCS to work with that server. ServerPort The port on which ClamAV listens for incoming connections. The default value is 3310. Note: To change this port, you must modify both this parameter and the TCPSocket field in the Clam AV configuration file. See Configuring ClamAV Settings on page 77. SpamAssassin ServerIP The IP address of the server running SpamAssassin. By default this is the same server as the SCS. Note: If SpamAssassin is installed on another server, you can stop the Check Point Mail AntiSpam service and direct the SCS to work with that server. ServerPort The port on which SpamAssassin listens for incoming connections. The default value is 783. Note: To change this port, you must modify both this parameter and the relevant parameter in the SpamAssassin configuration file. ServerTimeout If the Spam Daemon takes longer than this many seconds to reply to a message, SCS will abort the 76 Security Management Portal Installation Guide Configuring ClamAV Settings Section Parameter Description connection and treat this as a failure to connect. The default value is 60. MessageSize The maximum size of messages that will be scanned for spam (in bytes). Larger messages will not be scanned for spam. The default value is 256000. SmartFilter UpdateInterval The interval of time (in minutes) at which the SCS should download updates to the SmartFilter database. The default value is 360. Log LogLevel The lowest level of messages to be logged. The possible levels are: Info Warning Error The default value is “Info”. LogVerbose Indicates whether to enable verbose log messages. This can have the following values: true - Enable verbose log messages. false - Disable verbose log messages. Configuring ClamAV Settings To configure ClamAV settings, edit the ClamAV configuration file clamd.conf, which is located at $SMP_HOME\ClamAV\conf, where $SMP_HOME is the SMP installation directory. Chapter 9: Configuring the Secuirty Content Filtering Server 77 Configuring SpamAssassin Settings This file's most important fields are described in the table below. For complete documentation of the ClamAV configuration file, see the comments in the file itself. Table 8: ClamAV Configuration Fields Fields Description TCPSocket The port on which ClamAV server listens for incoming connections. Note: To change this port, you must modify both this field and the ClamServerPort parameter in the SCS configuration file. See Configuring SCS General Settings on page 74. TCPAddr The IP address to which the ClamAV server binds. Foreground Specifies whether the ClamAV daemon should stay in the foreground or move to the background once started. Warning: Do not disable this option. Configuring SpamAssassin Settings To configure SpamAssassin settings, edit the SpamAssassin configuration file local.cf, which is located at $SMP_HOME\Perl\site\etc\mail\spamassassin, where $SMP_HOME is the SMP installation directory. This file's most important fields are described in the table below. For complete documentation of the SpamAssassin configuration file, see http://spamassassin.apache.org/full/3.0.x/dist/doc/Mail_SpamAssassin_Conf.html. Table 9: SpamAssassin Configuration Fields Fields Description rewrite_header {subject | If this field is set, SpamAssassin will tag the suspected spam from | to} STRING message's header. 78 Security Management Portal Installation Guide Configuring SpamAssassin Settings Fields Description {subject | from | to} specifies which header should be tagged. STRING is the text that should replace the header. For example: rewrite_header Subject SPAM required_score n.nn The score required in order for a message to be considered spam. n.nn is the score. The default value is 5. report_safe { 0 | 1 | 2 } Indicates how SpamAssassin should handle incoming messages that are tagged as spam. The possible values are: 0 - SpamAssassin will modify incoming messages that are tagged as spam by adding X-Spam- headers, but will not change the message body. In addition, SpamAssassin will add the X-Spam-Report header. 1 - SpamAssassin will not modify incoming messages that are tagged as spam. Instead, SpamAssassin will create a new report message and attach the original message as a message/rfc822 MIME part. This ensures that the original message is completely preserved, not easily opened, and simple to recover. 2 - SpamAssassin will not modify incoming messages that are tagged as spam. Instead, SpamAssassin will create a new report message and attach the original message in text/plain format. This setting is useful for mail clients that automatically load attachments, and ensures that the original message is not easily extracted or viewed. The default value is 1. skip_rbl_checks { 0 | 1 } Indicates whether SpamAssassin should run RBL checks. The possible values are: 0 - Run RBL checks. Chapter 9: Configuring the Secuirty Content Filtering Server 79 Configuring SpamAssassin Settings Fields Description 1 - Do not run RBL checks. The default value is 0. If your ISP already does this for you, set this field to 1. use_bayes { 0 | 1 } Indicates whether to use the naive-Bayesian-style classifier built into SpamAssassin. This is a master on/off switch for all Bayes-related operations. The possible values are: 0 - Do not use the built-in classifier. 1 - Use the built-in classifier. The default value is 1. 80 Security Management Portal Installation Guide Glossary of Terms Glossary of Terms A antivirus A program that detects viruses and takes appropriate action. B batch A group of gateways that share certain attributes. C center gateway A member of a star VPN community*, which can establish VPN tunnels* with each satellite gateway* in the community. Also called a hub. certificate A digital signature encrypted with a public key and with the private key of the Certificate Authority (CA)*. Gateways, users, and computers use certificates to identify themselves and provide verifiable information. For instance, a certificate includes an entity’s Distinguished Name (DN), public key, and possibly the IP address. After two entities exchange and validate each other's certificates, they can begin encrypting information between themselves using the public keys in the certificates. Glossary of Terms Certificate Authority (CA) The Certificate Authority (CA) issues certificates* to entities such as gateways, users, or computers. The entity later uses the certificate to identify itself and provide verifiable information. For instance, the certificate includes the Distinguished Name (DN) (identifying information) of the entity, as well as the public key (information about itself), and possibly the IP address. After two entities exchange and validate each other's certificates, they can begin encrypting information between themselves using the public keys in the certificates. Content Vectoring Protocol (CVP) An OPSEC* API that enables integration of third-party content security applications such as antivirus software into gateways. The CVP API has been adopted by a wide variety of security vendors. Customer Premises Equipment (CPE) Communications equipment located at the customer's site. 81 Glossary of Terms D demilitarized zone (DMZ) An internal network defined in addition to the LAN network and protected by the Embedded NGX gateway. DHCP Any machine requires a unique IP address to connect to the Internet using Internet Protocol. Dynamic Host Configuration Protocol (DHCP) is a communications protocol that assigns Internet Protocol (IP) addresses to computers on the network. DHCP uses the concept of a "lease" or amount of time that a given IP address will be valid for a computer. Domain Name System (DNS) An Internet service that receives domain names and returns the corresponding IP addresses. Dynamic DNS (DDNS) A service that allows you to assign a domain name to a gateway, and that updates the mapping of domain name to IP address each time the gateway’s IP address changes. Dynamic VPN (DVPN) A service that allows the creation of VPN communities. Each time the IP address of a gateway in the VPN community changes, the DVPN service automatically updates all the gateways in the community with the most recent IP address. 82 E Event Logging Module (ELM) A remote logging mechanism that enables the SMS* to collect log information and security reports from Embedded NGX gateways. F firewall A combination of hardware and software resources positioned between a local (trusted) network and the Internet. The firewall ensures that all communication between an organization’s network and the Internet meet the organization’s security policy. firmware Software embedded in a device. G gateway A device positioned between two networks, and through which all communications between the networks must pass. A gateway is the natural choice for enforcing a security policy and providing encryption and authentication services. H High Availability A configuration in which redundant components take over the tasks of failed components, to maintain constant availability of a system despite failures. Security Management Portal Installation Guide Glossary of Terms host A computer connected to a network. link and network layers), that enforces a security policy*. HTTPS Hypertext Transfer Protocol over Secure Socket Layer, or HTTP over SSL. Inspection Script The ASCII file that the Check Point Policy Editor generates from the security policy*. An Inspection Script can also be written using a text editor. A protocol for accessing a secure Web server. It uses SSL as a sub-layer under the regular HTTP application. This directs messages to a secure port number rather than the default Web port number, and uses a public key to encrypt data HTTPS is used to transfer confidential user information. I INSPECT Check Point’s high-level scripting language for defining a security policy*. An INSPECT script* is compiled into machine code and loaded into an Inspection Module* for execution. INSPECT Script See Inspection Script on page 83. Inspection Code A code that is compiled from an Inspection Script* and loaded into an Embedded NGX FireWall Module for enforcement. Also called INSPECT Code. Inspection Module A Check Point security application embedded in the broadband access device or gateway, (between the data Glossary of Terms Internet A public network connecting many thousands of computer networks in a three-level hierarchy, including backbone networks (such as NSFNET, MILNET), mid-level networks and sub-networks. The Internet utilizes multiple communication protocols (especially TCP/IP*) to create a worldwide communications medium. Internet Protocol (IP) The network layer for the TCP/IP* protocol suite. IP is a connectionless, best-effort packet switching protocol that is designed to provide the most efficient delivery of packets across the Internet. intranet An organization’s internal private network that is managed according to Internet protocols, but accessible only inside the organization. IP address The 32-bit address defined by the Internet Protocol to uniquely identify Internet hosts and servers. 83 Glossary of Terms IP spoofing A technique whereby an intruder attempts to gain access to a network by altering a packet’s IP address to make it appear as though the packet originated in a part of the network with higher access privileges, (for example, the IP address of a workstation in the local network). This form of attack is only possible if a network’s internal IP addresses have been exposed. K key Information used to encrypt and decrypt data. L LAN See Local Area Network (LAN) on page 84. load balancing The ability to distribute processing loads among multiple servers, so as to improve performance and reduce access time. Load balancing is often transparent to the user. It improves Internet security by reducing the risks associated with certain attacks and by applying greater resources to the tasks of monitoring and filtering network traffic. A variety of algorithms can be used to determine how best to distribute traffic over these servers. 84 Local Area Network (LAN) A data network intended to serve an area of only a few square kilometers or less (more typically, an individual organization). LANs consist of software and equipment such as cabling, hubs, switches, and routers, enabling communication between computers and the sharing of local resources such as printers, databases, and file and video servers. local management plan A service plan which allows the administrators of gateways subscribed to this plan to configure management, security, and network settings. Logging and Event API (LEA) An OPSEC* API that enables an application to securely receive and process both real-time and historical logging and auditing events generated by Check Point SMP. LEA can be used by a variety of applications to complement firewall management. M MAC address The physical hardware address of a device connected to a network. Managed Internet Security Services Bundled security services, including secure Internet*, intranet* and extranet, that are provided by a Service Provider*. Typically, the Service Provider handles management and support for the security services, which Security Management Portal Installation Guide Glossary of Terms can be implemented as part of the Internet service or customized to client needs. meshed VPN community A VPN community in which all members can communicate directly with each other and fully access the networks behind the gateways. N network address The network portion of an IP address*. Depending on the network’s class, this can comprise the first one to three bytes of an IP address, with the remainder being the host or server address. Network Address Translation Translating an internal network’s real IP addresses to “false” IP addresses, either to prevent exposing the real addresses or to enable hosts with “invalid” addresses to communicate on the Internet, thus avoiding the need to change a network’s IP addresses (a formidable, error-prone task). NOC Network Operating Center O Open Platform for Secure Enterprise Connectivity (OPSEC) An open, industry-wide alliance, driven by Check Point Software Technologies, to ensure interoperability at the policy level between security products. Glossary of Terms Interoperability is achieved through a combination of published APIs, industry-standard protocols, and a high-level scripting language. OPSEC encourages partnerships in the areas of infrastructure (network products and services), framework (security products), and passport (applications developers). OPSEC See Open Platform for Secure Enterprise Connectivity (OPSEC) on page 85. P packet A unit of data, as sent across a network. packet filter A type of firewall* that examines only the network layer of a packet* and is typically implemented by routers. This type of firewall cannot support dynamic protocols nor apply application intelligence to the data stream. password A short string of characters, knowledge of which is required to gain access to some resource. Passwords are considered unreliable security devices because they are relatively easy to guess at, and people tend not to take strict precautions against their disclosure. See also token on page 88. 85 Glossary of Terms public network Any computer network, such as the Internet*, that offers long-distance inter-networking, using open, publicly accessible telecommunications services, (*in contrast to a WAN* or LAN*). R remote management plan A service plan which allows SMP administrators to remotely configure management, security, and network settings for gateways subscribed to the plan. Rule Base An ordered set of rules that defines an Embedded NGX security policy*. A rule describes a communication in terms of its source, destination, and service, and specifies whether the communication should be accepted or rejected, as well as whether it is to be logged. Each communication is tested against the Rule Base. If it does not match any of the rules, it is dropped. S satellite gateway A member of a star VPN community*, which can only establish VPN tunnels with the center gateway*. Also called a spoke. Security Content Filtering Server (SCS) An optional Check Point component that represents a full antivirus, antispam, and URL filtering solution. The SCS is 86 based on the free, open-source ClamAV antivirus system, the free Apache SpamAssassin, and on the Secure Computing SmartFilter URL filtering system. Security Management Center (SMC) A Web-based application for managing, configuring, and monitoring all SMP user and system settings. Security Management Server (SMS) A Check Point component that distributes security policies, firmware, and user interfaces to gateways. The SMS also installs the gateway’s certificate on the corresponding appliance. security policy A security policy is defined in terms of firewalls*, services, users and the rules that govern the interactions between them. Once these have been specified, an Inspection Script* is generated and then installed on the firewalled hosts or gateways. The gateways can then enforce the security policy on a per-user basis, enabling verification not only of the communication’s source, destination, and service, but of the user’s authenticity, as well. A user-based security policy also allows control based on content. For example, mail to or from certain addresses can be rejected or redirected, access can be denied to specific URLs, and antivirus checking of transferred files can be performed. Security Management Portal Installation Guide Glossary of Terms Security with Transport Protocol (SWTP) The protocol used by the SMS to communicate with gateways. Self Provisioning Portal (SPP) A website that enables customers to change some of their own settings. Stateful Inspection A technology developed and patented by Check Point that provides the highest level of security currently available. A Stateful Inspection Module accesses and analyzes all the data derived from all communication layers. This state and context data is stored and updated dynamically, providing virtual session information for tracking connectionless protocols. server group A group of Security Management Servers* (SMS). service plan A service plan is a template in which you define a set of gateway features. Each gateway is assigned to a plan, and by default, inherits its settings from the plan. There are two types of plans: remote management* and local management*. Service Provider A provider of access to the Internet. Some providers own the network infrastructure, while others lease network capacity from a third party. SP See Service Provider on page 87. star VPN community A VPN community composed of two types of members, center* and satellite* (also called hub and spoke), where: The center gateway can establish VPN tunnels with each satellite gateway. Glossary of Terms Satellite gateways cannot establish VPN tunnels with each other. Cumulative data from the communication and application states, network configuration and security rules are all used to decide on an appropriate action: either accepting, rejecting or encrypting the communication. Any traffic not explicitly allowed by the security policy* is dropped. Subnet Mask A 32-bit identifier indicating how the network is split into subnets. The subnet mask indicates which part of the IP address is the host ID and which indicates the subnet. T TCP See Transmission Control Protocol on page 88. 87 Glossary of Terms TCP/IP See Transmission Control Protocol over Internet Protocol (TCP/IP) on page 88. token A password* that can be used only once, typically generated by a hardware device, as needed. Tokens are considered secure, since even if one is revealed, it cannot be misused, because it is no longer valid after its first use. Transmission Control Protocol An connection-oriented and stream-oriented Internet standard transport layer protocol, (in contrast to the connectionless UDP protocol). Transmission Control Protocol over Internet Protocol (TCP/IP) The common name for the suite of UNIX-based protocols developed by the U.S. Department of Defense in the 1970s. TCP/IP is the primary language of the Internet. U URL An identifier that uniquely identifies a Web-based resource, such as a Web page, (for example: www.checkpoint.com). URL Filtering Protocol (UFP) An OPSEC* API that enables the integration of a third-party application to categorize and control access to specific URL addresses. 88 V Virtual Private Network (VPN) A network with both private and public segments, in which data passing over its public segments is encrypted so as to achieve secure communications. A VPN is significantly less expensive and more flexible than a dedicated private network. virus A program that replicates itself on computer systems by incorporating itself into other programs that are shared among computer systems. Once in a new host, a virus can damage data in the host’s memory, display unwanted messages, crash the host or, in some cases, simply lie dormant until a specified event occurs (for example, the turning of a new year). VPN community A group made up of several gateways sharing the same VPN security parameters, such as encryption algorithms. When a new member is added to a community, it automatically inherits the appropriate properties and can immediately establish secure sessions with the rest of the VPN community. There are two types of VPN communities: star and meshed. VPN routing A way of directing communication through a specific VPN tunnel in order to enhance existing connectivity or Security Management Portal Installation Guide Glossary of Terms security. For example, in a star VPN community* configured for VPN routing, packets sent by a satellite gateway are routed through the center gateway to the destination satellite gateway. VPN tunnel A secure connection between a Remote Access VPN Client and a Remote Access VPN Server. W Web server A network device that stores and serves up any kind of data file, including text, graphic images, video, or audio. Its stored information can be accessed via the Internet* using standard protocols, most often HTTP. Wide Area Network (WAN) A geographically large network, (usually private). A WAN is typically constructed to span numerous locations within a single city. wireless LAN (WLAN) A wireless local area network protected by the Embedded NGX gateway. Glossary of Terms 89 Index Index A About This Guide • 1 antivirus • 81 B Backing Up the SMP Installation • 50 Basic Installation • 20 batch • 81 C center gateway • 81 certificate • 81 Certificate Authority (CA) • 81 Check Point Reporting Module • 16 Completing Installation • 41 Configuring ClamAV Settings • 77 Configuring SCS General Settings • 74 Configuring SpamAssassin Settings • 78 Configuring the Secuirty Content Filtering Server • 73 Configuring the SMS to Ignore Disabled Gateways • 62 Contacting Technical Support • 2 Content Vectoring Module (CVM) • 8 Content Vectoring Protocol (CVP) • 81 Customer Premises Equipment (CPE) • 81 Index D demilitarized zone (DMZ) • 82 DHCP • 82 Document Conventions • 2 Domain Name System (DNS) • 82 Dynamic DNS (DDNS) • 82 Dynamic DNS Service (DDNS) • 14 Dynamic VPN (DVPN) • 82 Dynamic VPN Service (DVPN) • 12 E Editing the SMC Configuration File • 53 Editing the SMS INI File • 58 Event Logging Module (ELM) • 5, 82 F firewall • 82 firmware • 82 Freeing Ports • 32 G gateway • 82 H High Availability • 82 host • 83 HTTPS • 83 91 Index I INSPECT • 83 INSPECT Script • 83 local management plan • 84 Logging and Event API (LEA) • 84 M Inspection Code • 83 MAC address • 84 Inspection Module • 83 Managed Internet Security Services • 84 Inspection Script • 83 meshed VPN community • 85 Installation • 33 Multiple Portals Installation • 25 Installation Schemes • 19 N Installing a Directory Service • 31 network address • 85 Installing a Typical Primary SMP • 36 Network Address Translation • 85 Installing a Typical Secondary SMP • 38 NOC • 85 Installing an SMS • 40 Installing SMP • 35 O Intended Audience • 1 Open Platform for Secure Enterprise Connectivity (OPSEC) • 85 Internet • 83 OPSEC • 85 Internet Protocol (IP) • 83 P intranet • 83 packet • 85 Introduction • 1 packet filter • 85 IP address • 83 password • 85 IP spoofing • 84 Preparing for SMP Installation • 27 K key • 84 L Protecting the SMP behind a Firewall • 67 public network • 86 R LAN • 84 Related Publications • 2 load balancing • 84 remote management plan • 86 Load Balancing Module (LBM) • 12 Replicating Databases • 71 Local Area Network (LAN) • 84 Restoring the SMP Installation • 51 92 Security Management Portal Installation Guide Index Rule Base • 86 S Tips for Capacity Planning • 28 token • 88 satellite gateway • 86 Transmission Control Protocol • 88 Secuirty Management Center (SMC) • 4 Transmission Control Protocol over Internet Protocol (TCP/IP) • 88 Secuirty Management Server (SMS) • 3 Security Content Filtering Server (SCS) • 86 Security Management Center (SMC) • 86 Security Management Server (SMS) • 86 security policy • 86 Security with Transport Protocol (SWTP) • 87 Self Provisioning Portal (SPP) • 4, 87 server group • 87 service plan • 87 Service Provider • 87 SMP Architecture • 3 SMP Virtual Portals • 5 SMS High Availability Installation • 21 Troubleshooting • 63 U Uninstalling SMP • 45 Upgrading the SMP • 46 Upgrading the SMP on a Different Server • 49 Upgrading the SMP on the Current Server • 47 URL • 88 URL Filtering Module (UFM) • 6 URL Filtering Protocol (UFP) • 88 V Virtual Private Network (VPN) • 88 virus • 88 SMS High Availability with Load Balancing Installation • 24 VPN community • 88 SP • 87 VPN routing • 88 star VPN community • 87 VPN tunnel • 89 Stateful Inspection • 87 VStream Antispam Service • 11 Subnet Mask • 87 VStream Antivirus Signature Updates Service • 11 System Requirements • 27 T TCP • 87 TCP/IP • 88 Index Vulnerability Scanning Service (VSS) • 17 W Web server • 89 93 Index Wide Area Network (WAN) • 89 wireless LAN (WLAN) • 89 94 Security Management Portal Installation Guide