Check Point IPS: Administration Guide
Check Point IPS: Administration Guide
Check Point IPS: Administration Guide
R75
Administration Guide
15 December 2010
2010 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying, distribution, and decompilation. No part of this product or related documentation may be reproduced in any form or by any means without prior written authorization of Check Point. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19. TRADEMARKS: Refer to the Copyright page (http://www.checkpoint.com/copyright.html) for a list of our trademarks. Refer to the Third Party copyright notices (http://www.checkpoint.com/3rd_party_copyright.html) for a list of relevant copyrights and third-party licenses.
Important Information
Latest Software
We recommend that you install the most recent software release to stay up-to-date with the latest functional improvements, stability fixes, security enhancements and protection against new and evolving attacks.
Latest Documentation
The latest version of this document is at: http://supportcontent.checkpoint.com/documentation_download?ID=11663 For additional technical information, visit the Check Point Support Center (http://supportcenter.checkpoint.com).
Revision History
Date 15 December 2010 Description First release of this document
Feedback
Check Point is engaged in a continuous effort to improve its documentation. Please help us by sending your comments (mailto:[email protected]?subject=Feedback on Check Point IPS R75 Administration Guide).
Contents
Important Information .............................................................................................. 3 The Check Point IPS Solution ................................................................................. 7 Tour of IPS .............................................................................................................8 IPS Terminology .....................................................................................................8 Enforcing Gateways ..........................................................................................8 Protections.........................................................................................................8 Profiles...............................................................................................................9 IPS Overview .........................................................................................................9 In My Organization ..........................................................................................10 Messages and Action Items ............................................................................10 Security Status ................................................................................................10 Security Center ................................................................................................11 Getting Started with IPS ......................................................................................... 12 Choosing the Level of Protection .........................................................................12 Basic IPS Protection ........................................................................................12 Advanced IPS Protection.................................................................................13 Changing the Assigned Profile .............................................................................13 Recommendations for Initial Deployment.............................................................13 Troubleshooting ...............................................................................................14 Protect Internal Hosts Only..............................................................................14 Bypass Under Load .........................................................................................14 Installing the Policy ..............................................................................................14 Managing Gateways ............................................................................................... 15 Adding IPS Software Blade Gateways .................................................................15 Adding IPS-1 Sensors ..........................................................................................16 Managing Profiles and Protections ....................................................................... 18 IPS Profiles ..........................................................................................................18 Creating Profiles ..............................................................................................18 Activating Protections ......................................................................................19 Managing Profiles ............................................................................................23 Troubleshooting Profiles ..................................................................................25 Customizing Profiles for IPS-1 Sensors ..........................................................25 Protections Browser .............................................................................................26 Customizing the Protections Browser View .....................................................26 Protection Parameters .....................................................................................29 Protected Servers ................................................................................................31 DNS Servers....................................................................................................31 Web Servers ....................................................................................................32 Mail Servers.....................................................................................................33 Configuring Specific Protections .......................................................................... 34 Configuring Network Security Settings .................................................................34 Streaming Engine Settings ..............................................................................35 Receiving Block List ........................................................................................35 Anti Spoofing Configuration Status..................................................................35 Aggressive Aging Configurations ....................................................................35 IP Fragments ...................................................................................................37 DShield Storm Center......................................................................................38 Configuring Application Intelligence .....................................................................39 Mail ..................................................................................................................39 FTP ..................................................................................................................40 Microsoft Networks ..........................................................................................40 Peer-to-Peer ....................................................................................................40
Instant Messengers .........................................................................................41 VoIP .................................................................................................................42 SNMP ..............................................................................................................42 VPN Protocols .................................................................................................42 Citrix ICA .........................................................................................................42 Remote Control Applications ...........................................................................43 MS-RPC ..........................................................................................................43 Configuring Web Intelligence ...............................................................................43 Configuring Web Intelligence Protections ........................................................43 Customizable Error Page ................................................................................45 Connectivity/Performance Versus Security .....................................................46 Managing Application Controls.............................................................................47 Configuring Geo Protections ................................................................................47 Controlling Traffic by Country ..........................................................................48 The IP Address to Country Database ..............................................................49 Log Aggregation by Country ............................................................................49 Monitoring Traffic ................................................................................................... 51 Monitoring Events using SmartView Tracker .......................................................51 Viewing IPS Events .........................................................................................51 Viewing IPS Event Details ...............................................................................52 Opening Protection Settings ............................................................................52 Working with Packet Information ..........................................................................53 Attaching a Packet Capture to Every Log ........................................................53 Viewing Packet Capture Data in SmartView Tracker ......................................53 Allowing Traffic using Network Exceptions...........................................................54 Viewing Network Exceptions ...........................................................................55 Configuring Network Exceptions .....................................................................55 Tracking Protections using Follow Up ..................................................................56 Marking Protections for Follow Up ...................................................................57 Unmarking Protections for Follow Up ..............................................................58 Optimizing IPS ........................................................................................................ 60 Managing Performance Impact ............................................................................60 Gateway Protection Scope ..............................................................................60 Web Protection Scope .....................................................................................61 Bypass Under Load .........................................................................................61 Cluster Failover Management .........................................................................62 Tuning Protections ...............................................................................................62 Profile Management ........................................................................................62 IPS Policy Settings ..........................................................................................63 Enhancing System Performance ..........................................................................63 Performance Pack ...........................................................................................63 CoreXL ............................................................................................................64 Updating Protections ............................................................................................. 65 IPS Services .........................................................................................................65 Managing IPS Contracts ......................................................................................65 Updating IPS Protections .....................................................................................65 Configuring Update Options ............................................................................66 Updating IPS Manually ....................................................................................66 Scheduling IPS Updates..................................................................................66 Importing an Update Package .........................................................................67 Reviewing New Protections .............................................................................67 Regular Expressions .............................................................................................. 68 Overview of Regular Expressions ........................................................................68 Metacharacters ....................................................................................................68 Backslash ........................................................................................................69 Square Brackets ..............................................................................................70 Parentheses ....................................................................................................70 Hyphen ............................................................................................................70 Dot ...................................................................................................................70
Quantifiers .......................................................................................................71 Vertical Bar ......................................................................................................72 Circumflex Anchor ...........................................................................................72 Dollar Anchor ...................................................................................................72 Internal Options ....................................................................................................72 Earlier Versions ....................................................................................................72 Support for Internal Option Settings ................................................................73 Index ........................................................................................................................ 75
Chapter 1
The Check Point IPS Solution
Check Point IPS is an Intrusion Prevention System (IPS). Whereas the Security Gateway firewall lets you block traffic based on source, destination and port information, IPS adds another line of defense by analyzing traffic contents to check if it is a risk to your network. IPS protects both clients and servers, and lets you control the network usage of certain applications. The new, hybrid IPS detection engine provides multiple defense layers which allows it excellent detection and prevention capabilities of known threats, and in many cases future attacks as well. It also allows unparalleled deployment and configuration flexibility and excellent performance. Check Point IPS is available in two deployment methods: IPS Software Blade - integrated with the Check Point Security Gateway to provide another layer of security in addition to the Check Point firewall technology. IPS-1 Sensor - installed without the Check Point Firewall and dedicated to protecting network segments against intrusion.
Layers of Protection The layer of the IPS engine include: Detection and prevention of specific known exploits. Detection and prevention of vulnerabilities, including both known and unknown exploit tools, for example protection from specific CVEs. Detection and prevention of protocol misuse which in many cases indicates malicious activity or potential threat. Examples of commonly manipulated protocols are HTTP, SMTP, POP, and IMAP. Detection and prevention of outbound malware communications. Detection and prevention of tunneling attempts. These attempts may indicate data leakage or attempts to circumvent other security measures such as web filtering. Detection, prevention or restriction of certain applications which, in many cases, are bandwidth consuming or may cause security threats to the network, such as Peer to Peer and Instant Messaging applications. Detection and prevention of generic attack types without any pre-defined signatures, such as Malicious Code Protector.
In all, IPS has deep coverage of dozens of protocols with thousands of protections. Check Point constantly updates the library of protections to stay ahead of the threats. Capabilities of IPS The unique capabilities of the Check Point IPS engine include: Clear, simple management interface Reduced management overhead by using one management console for all Check Point products Unified control of both the IPS-1 Sensors and the integrated IPS Software Blade Easy navigation from business-level overview to a packet capture for a single attack Up to 15 Gbps throughput with optimized security, and up to 2.5 Gbps throughput with all IPS protections activated #1 security coverage for Microsoft and Adobe vulnerabilities Resource throttling so that high IPS activity will not impact other blade functionality Complete integration with Check Point configuration and monitoring tools, such as SmartEvent, SmartView Tracker and SmartDashboard, to let you take immediate action based on IPS information
Page 7
Tour of IPS
As an example, some malware can be downloaded by a user unknowingly when browsing to a legitimate web site, also known as a drive-by-download. The malware may exploit a browser vulnerability by creating a special HTTP response and sending it to the client. IPS can identify and block this type of attack even though the firewall may be configured to allow the HTTP traffic to pass. In This Chapter Tour of IPS IPS Terminology IPS Overview 8 8 9
Tour of IPS
The IPS tree in provides easy access to IPS features, specific protections, and expert configurations. The tree is divided into the following sections: Dashboard for viewing IPS status, activity and updates ("IPS Overview" on page 9) List of gateways enforcing IPS protections ("Assigning Profiles to Gateways" on page 23) Settings for IPS profiles (see "IPS Profiles" on page 18) Settings for individual protections ("Protections Browser" on page 26) Protection enforcement by source or destination country ("Configuring Geo Protections" on page 47) Resources that are not subject to IPS inspection ("Allowing Traffic using Network Exceptions" on page 54) Manual or Automatic updates to IPS protections ("Updating Protections" on page 65) Protections marked for follow up action (see "Tracking Protections using Follow Up" on page 56)
IPS Terminology
The following terms are used throughout this guide:
Enforcing Gateways
IPS Software Blade: the Software Blade that can be installed on a Security Gateway for enforcing IPS Software Blade protections. IPS-1 Sensor: a device that has only the IPS-1 sensor software installed for enforcing IPS-1 sensor protections. A sensor does not have any routing capabilities.
Protections
Protection: a configurable set of rules which IPS uses to analyze network traffic and protect against threats
The Check Point IPS Solution Page 8
IPS Overview
Activation Settings
Active: the protection action that activates a protection to either Detect or Prevent traffic Detect: the protection action that allows identified traffic to pass through the gateway but logs the traffic or tracks it according to user configured settings Inactive: the protection action that deactivates a protection Prevent: the protection action that blocks identified traffic and logs the traffic or tracks it according to user configured settings
Types of Protections
Application Controls: the group of protections that prevents the use of specific end-user applications Engine Settings: the group of protections that contain settings that alter the behavior of other protections Protocol Anomalies: the group of protections that identifies traffic that does not comply with protocol standards Signatures: the group of protections that identifies traffic that attempts to exploit a specific vulnerability
Protection Parameters
Confidence Level: how confident IPS is that recognized attacks are actually undesirable traffic Performance Impact: how much a protection affects the gateway's performance Protections Type: whether a protection applies to server-related traffic or client-related traffic Severity: the likelihood that an attack can cause damage to your environment; for example, an attack that could allow the attacker to execute code on the host is considered Critical
Profiles
IPS Mode: the default action, either Detect or Prevent, that an activated protection takes when it identifies a threat IPS Policy: a set of rules that determines which protections are activated for a profile Profile: a set of protection configurations, based on IPS Mode and IPS Policy, that can be applied to enforcing gateways Troubleshooting: options that can be used to temporarily change the behavior of IPS protections, for example, Detect-Only for Troubleshooting
IPS Overview
The IPS Overview page provides quick access to the latest and most important information.
Page 9
IPS Overview
In My Organization
IPS in My Organization summarizes gateway and profile information. Figure 1-1
Overview > IPS in My Organization
The table of the configured profiles displays the following information: Profile the name of the profile IPS Mode whether the profile is set to just Detect attacks or to prevent them as well Activation the method of activating protections; either IPS Policy or Manual Gateways the number of gateways enforcing the profile
Figure 1-2
Security Status
Security Status provides an up-to-the-minute display of the number of Detect and Prevent events that IPS handled over a selected time period, delineated by severity. You can rebuild the chart with the latest statistics by clicking on Refresh. Note - Security Status graphs compile data from gateways of version R70 and above.
Page 10
IPS Overview
Figure 1-3
The Average shows the number of handled attacks that is average for the selected time period in your company. For example, if you choose to see the status of attacks in the past 24 hours and the average of critical attacks is 45, this indicates that in your organization the average number of attacks during a 24-hour period is 45. If the current number of attacks is much higher than the average, it may indicate a security issue that you should handle immediately. For example, if more than 500 critical attacks were handled by IPS in the past 24 hours, and the average is 45, you can see quickly that your organization has been targeted with critical attacks in a persistent manner and you should handle this urgently. If the current number of attacks is much lower than the average, it may indicate an issue with IPS usage that you should troubleshoot. For example, if less than 10 critical attacks were handled by IPS in the past 24 hours, with the average of 45, you can see that there is a possible issue with IPS configuration; perhaps a gateway was installed with a policy that didn't include an IPS profile.
Security Center
Security Center is a scrolling list of available protections against new vulnerabilities. The Open link next to a Security Center item takes you to the associated Check Point Advisory. Figure 1-4
Overview > Security Center
Page 11
Chapter 2
Getting Started with IPS
IPS can be configured for many levels of control over network traffic, but it is also designed to provide IPS protection right out of the box for IPS Software Blades and IPS-1 Sensors. IPS Software Blades When you enable the IPS Software Blade on a Security Gateway object, the gateway is automatically added to the list of Enforcing Gateways and it is assigned the Default Protection profile. You also have the option to assign the Recommended Protection profile to the gateway or to create a customized profile and assign it to the gateway. IPS-1 Sensors When you add a new IPS-1 Sensor object, the sensor is automatically added to the list of Enforcing Gateways and it is assigned the IPS-1 Recommended Protection profile.
The next time you install a policy on the gateway, the IPS profile is also installed on the gateway and the gateway immediately begins enforcing IPS protection on network traffic. In addition to assigning your gateway an IPS profile, you should also review the Recommendations for Initial Deployment (on page 13). In This Chapter Choosing the Level of Protection Changing the Assigned Profile Recommendations for Initial Deployment Installing the Policy 12 13 13 14
Application Control protections are not activated by default in any of the pre-defined profiles.
Default Protection
The Default Protection profile is defined with these parameters:
Page 12
IPS Mode: Prevent IPS Policy: All Signature protections with Very Low Performance Impact are activated Updates Policy: Protections downloaded using Online Updates are set to Prevent.
Recommended Protection
The Recommended Protection profile is defined with these parameters: IPS Mode: Prevent IPS Policy: All Signature and Protocol Anomaly protections with Low Severity and Medium or higher Confidence-level are activated, excluding protections with Critical Performance Impact. Updates Policy: Protections downloaded using Online Updates are set to Detect.
Page 13
Troubleshooting
It is recommended to enable Detect-Only for Troubleshooting on the profile during the initial installation of IPS. This option overrides any protections that are set to Prevent so that they will not block any traffic. During this time you can analyze the alerts that IPS generates to see how IPS will handle network traffic, while avoiding any impact on the flow of traffic. Once you have used this information to customize the IPS protections to suit your needs, disable Detect-Only for Troubleshooting to allow IPS protections set to Prevent to block identified traffic on the gateways.
Your environment is now protected by Check Point IPS. Periodically review IPS events in SmartView Tracker to see the traffic that IPS identifies as a result of your IPS configuration. For more information, see Monitoring Traffic (on page 51).
Page 14
Chapter 3
Managing Gateways
IPS protections are enforced by Security Gateways with the IPS Software Blade enabled and by IPS-1 Sensors. The Enforcing Gateways page shows the list of all gateways enforcing IPS protections and the profile that is assigned to each gateway. IPS protections are divided into two main groups: IPS Software Blade protections - protections that can be enforced only by a Check Point Security Gateway with the IPS Software Blade enabled IPS-1 Sensor protections - protections that can be enforced only by an IPS-1 Sensor
General IPS Settings In the Enforcing Gateways page, you can select whether the IPS profiles will manage only IPS Software Blade protections or if they will also manage IPS-1 Sensor protections. If you choose to manage IPS-1 Sensor protections, you can add IPS-1 Sensors to your list of enforcing gateways and assign profiles to the sensors. If you choose to manage IPS-1 Sensors as well, the IPS-1_Recommended_Protection profile will be available in the list of Profiles. The Recommended_IPS-1_Protection profile contains recommended settings for both IPS Software Blade protections and IPS-1 Sensor protections. It can also be imported at a later time from the command line with the ips_export_import command. For a full explanation of the ips_export_import command, see the R75 IPS Administration Guide (http://supportcontent.checkpoint.com/documentation_download?ID=11663). Important - The Remove button will DELETE the selected gateway object. To remove a Security Gateway from Enforcing Gateways, disable the IPS Software Blade on the gateway. To remove an IPS-1 Sensor from Enforcing Gateways, delete the IPS-1 Sensor object.
In This Chapter Adding IPS Software Blade Gateways Adding IPS-1 Sensors 15 16
The Firewall Software Blade must be enabled to enable the IPS Software Blade.
Page 15
Latency Threshold The Latency Threshold suspends IPS inspection when the average latency of traffic passing through the sensor exceeds a specified threshold. The specified latency level will be treated as a Fail State. Then, traffic will be passed or dropped based on the Sensor bypass mode of the IPS-1 Sensor's General Properties. By default, this setting is off, but you can enable it from the IPS-1 Sensor's IPS page.
Managing Gateways
Page 16
Note - If policy installation fails when the IPS-1 Sensor is set to an IPS-Inline Working Mode, log into the sensor's CLI and check that the interfaces are set to work as inline pairs. Refer to the R71 IPS-1 Sensor Administration Guide (http://supportcontent.checkpoint.com/documentation_download?ID=10505).
Managing Gateways
Page 17
Chapter 4
Managing Profiles and Protections
In This Chapter IPS Profiles Protections Browser Protected Servers 18 26 31
IPS Profiles
IPS profiles enable you to configure sets of protections for groups of gateways. Without profiles you would have to configure IPS in a global policy for all your devices and network behavior, or configure each device separately. With profiles, you have both customization and efficiency. Up to 20 profiles may be created. IPS profiles are available for all Check Point NGX gateways. Note - For Connectra, IPS profiles are available for all NGX R62CM gateways and above. Earlier versions of Connectra gateway do not receive an IPS profile from Security Management server. Every profile created takes 2 MB of RAM from the user console machine on both Windows and Motif.
Creating Profiles
When you create a profile, you create a new SmartDashboard object. Protections can be activated, deactivated or given specific settings to allow the profile to focus on identifying certain attacks. The profiles can then be applied to groups of devices that need to be protected against those certain attacks.
To create a profile:
1. In the IPS tab, select Profiles. 2. Click New and choose an option: Create New Profile: Opens empty Profile Properties window for new configuration.
Page 18
IPS Profiles
Clone Selected Profile: Creates copy of selected profile. Select the cloned profile and click Edit to make changes (including providing a new name) in the Profile Properties window.
3. Configure the General properties. Profile Name: Mandatory, cannot contain spaces or symbols. Comment: Optional free text. Color: Optional color for SmartDashboard object mapping. IPS Mode: The default action that a protection will take when it is enabled. Prevent: Activated protections will block traffic matching the protection's definitions. Detect: Activated protections will track traffic matching the protection's definitions.
Protections Activation: Protections can be enabled automatically or manually. Activate according to IPS Policy: Let IPS activate protections automatically according to the IPS Policy criteria. (see "Automatically Activating Protections" on page 19) Manually activate protections: Do not let IPS automatically activate protections; activate them as needed. (see "Manually Activating Protections" on page 21) 4. Select IPS Policy > Updates Policy and select whether newly downloaded protections should be set by default to Prevent or Detect. 5. Click OK to create the profile.
Activating Protections
Each profile is a set of activated protections and instructions for what IPS should do if traffic inspection matches an activated protection. The procedures in this section explain how to activate protections for a profile.
Page 19
IPS Profiles
There are numerous protections available in IPS. It will take some time to become familiar with those that are relevant to your environment; some are easily configured for basic security without going too deeply into the details of the threat and the protection. Many protections can be safely activated automatically. It is recommended that you allow IPS to activate protections according to the IPS policy in the beginning. Then you can manually modify the protection settings as needed according to your monitored traffic.
Both: all protections will be activated, except for those that are: Excluded by the options selected here Application Controls or Engine Settings Defined as Performance Impact Critical 4. Set activation according to protection criteria. In the Protections to Deactivate area, select relevant criteria and then select the value that fits: Protections have severity: Activate protections only if their Severity level is higher than the value you select in the drop-down list. For example: you can set protections with low severity to not be activated automatically (Do not activate protections with severity Low or below ). You can always activate the protections that you want later, if analysis proves they are needed. Protections have confidence level: Activate protections only if their Confidence Level is higher than the selected value. For example: Do not activate protections if with confidence-level Low or below. The higher the Confidence Level of a protection, the more confident Check Point is that recognized attacks are indeed attacks; lower Confidence Levels indicate that some legitimate traffic may be identified as an attack. Protections have performance impact: Activate protections only if their Performance Impact is lower than the selected value. For example: Do not activate protections with performance impact High or higher. Some activated protections may cause issues with connectivity or performance. You can set protections to not be activated if they have a higher impact on gateway performance. Protocol Anomalies: Do not automatically activate Protocol Anomaly protections.
Page 20
IPS Profiles
3. Expand the tree nodes and select the categories, at any level that you want, that you do not want to be activated by the IPS Policy. For example, if you selected to automatically activate Server Protections and then add Syslog to the categories in the Non-Auto Activation window, the Syslog protections (such as Apply Malicious Code Protector) will not be automatically activated in this profile. 4. Click OK to close the Select Category window. 5. Click OK to close the Non-Auto Activation window. 6. Click OK to apply the Automatic Activation configuration and close the Profile Properties window.
Page 21
IPS Profiles
Note If you manually activate protections for a profile that has DetectOnly for Troubleshooting enabled, traffic will only be blocked once the Detect-Only for Troubleshooting has been disabled.
Activating Protections for All Profiles To manually activate a protection in all profiles:
In the Protections Browser, right-click on the protection that you want to activate and select the action that you want to apply to the protection.
Activating Protections for a Specific Profile To manually activate a protection for a specific profile:
1. Find the protection that you want to activate using the Protections Browser and click Edit. 2. Select the profile for which you want to activate this protection and click Edit. The protection can be activated for one profile and inactive for another; thus, it will be activated for some gateways and inactive for others. If the protection is inactive and Action according to IPS Policy: Inactive is selected, this protection is inactive due to the IPS Policy for this profile. You can override this setting or change the IPS Policy criteria. For instructions on changing IPS Policy, see Automatically Activating Protections (on page 19). To override the settings for this protection, continue with this procedure. 3. Select Override IPS Policy and select the action that you want to apply. Prevent: Activate IPS inspection for this protection and run active preventions on the gateways to which this profile is assigned. Detect: Activate IPS inspection for this protection, tracking related traffic and events.
Inactive: Do not enforce this protection. 4. If available, configure the Additional Settings that are relevant for its individual configurations and options. Some common settings include: Track: allows the administrator to define how he should be alerted about the protection. Examples of Track Actions: Log, Alert, Mail. Capture Packets: allows the packets relevant to the protection to be captured for additional analysis at a later time. The packet capture can be viewed from the event in SmartView Tracker. Note that a packet capture is automatically attached to the first log of an attack even if this option is not selected. For more information see Working with Packet Information (on page 53).
To remove overrides:
1. In the IPS tab, select Profiles.
Page 22
IPS Profiles
2. Select a profile from the list and click Actions > Remove overrides.
A message appears: Are you sure you want to reapply the profile's IPS Mode and Activation settings to the protections? 3. To confirm, click Yes. A message appears: All protections have been reset to the profile's settings. 4. Click OK.
Managing Profiles
Assigning Profiles to Gateways
To assign a profile to a gateway:
1. In the IPS tab, select Enforcing Gateways. 2. Select a gateway and click Edit. The IPS page of the gateway properties opens. 3. Select a profile from the Assign profile list. 4. Click OK.
View Protected Gateways by Profile To view a list of gateways that are protected by a specific profile:
1. In the IPS tab, select Profiles 2. Select a profile from the list and click Actions > Show Protected Gateways. The Protected Gateways window appears with the list of gateways that are assigned to the selected profile.
Page 23
IPS Profiles
Last modified at: Date and time of last modification. From client: Name of client machine from which the profile was modified. By Administrator: Username of the administrator who did the modifications.
On a Multi-Domain Server, you must use one of these methods to set the environment in which the command will run: Run mdsenv to set the environment (Multi-Domain Server or specific Domain Management Server) where the IPS profile is configured. Use -p <ip> to enter the IP address of the Multi-Domain Server or Domain Management Server where the IPS profile is configured.
You must enter the exact name of the profile that you want to export. The archive will be named <profile-name>.tar and is saved to your present working directory. You can also use the -o <file-name> to give the archive a specific name.
You must enter a name for the profile and the location of the archive. You can either import an archive that is in your present working directory or enter the exact location of the archive the you want to import.
Deleting Profiles
You can easily delete a profile (except for the Default_Protection profile), but it should be done carefully, as it may affect gateways, other profiles, or SmartDashboard objects.
To delete a profile:
1. In the IPS tab, select Profiles.
Page 24
IPS Profiles
2. Select the profile you want to delete and click Delete. The message appears: Are you sure you want to delete object <profile_name>? 3. Click Yes. If the profile contains references to/from other objects, another message appears: <profile_name> is used in another object. Are you sure you want to delete it? 4. Click Where Used? The Object References window opens.
For each object that references the profile, there is a value in the Is Removable? column. If this value is Yes for all objects, you can safely delete the profile. Otherwise, you should discover the relationship before deciding to delete this profile.
Troubleshooting Profiles
IPS includes the ability to temporarily stop protections set to Prevent from blocking traffic. This is useful when troubleshooting an issue with network traffic.
Page 25
Protections Browser
Dynamically changing the Confidence Level for a protection based on the type of traffic that passes through the IPS-1 Sensor Blocking an attack by dropping the connection without notifying the sender or by sending a Reject packet back to the sender to notify the sender that the traffic was not received Grouping recurring alert logs into Summary logs which indicate how frequently the alert has occurred without adding unnecessary log entries to the database
These are the IPS-1 Sensor settings that you can define in the IPS Profile: Capture Packets Turn on capture packets for all protections automatically captures packets for all active protections that have this capability. Turn on capture packets according to protections settings relies on the protections' settings to determine when packet captures are saved. Number of packets to capture specifies the number of packets you will be able to look at for each time packets are captured.
Quarantine Quarantined IP addresses will be released after X seconds specifies how long all traffic from a particular IP address will be rejected once that IP address has been identified as a threat.
Dynamic Confidence Level Automatically deactivate protections when their dynamic Confidence-Level falls below the threshold allows IPS to dynamically change turn off protections when an internal IPS algorithm determines that IPS is not identifying the attack with sufficient accuracy. This option is only available when protections are activated according to the IPS Policy, and the IPS Policy is set to deactivate protections based on Confidence-Level.
Connection Refusal Method Drop blocks the connection without notifying the sender of the failure. Reject (TCP Reset) blocks the connections and sends the sender a Reject packet to indicate that the connection was not accepted.
Log Flood Suppression Enable Log Suppression enables you to receive summary logs for frequently identified attacks. Specify settings for this feature using the Advanced button.
Protections Browser
The Protections Browser provides quick access to IPS protections and displays them with a summary of important information and usage indicators.
Severity
Page 26
Protections Browser
Description How confident IPS is that recognized attacks are actually undesirable traffic How much this protection affects the gateway's performance
See for details Confidence Level (on page 31) Performance Impact (on page 31)
Performance Impact
International CVE or CVE candidate name for attack Date the protection was released by Check Point Whether the protection is for servers, clients, or both Whether the protection is marked for Follow Up Type (on page 29)
Follow Up
Text to comment on the protection Whether the protection is enforced by IPS Software Blades or IPS-1 Sensors Activation setting of the protection in the profile Protection Mode (on page 30)
<profile_name>
Finding Protections
Use the Protections page for filtering the complete protections list. You can filter by protection name, CVE number, or by any information type that is displayed in the columns.
Filtering Protections
You can filter the list of protections by any criteria that is displayed in the Customizing the Protections Browser View (on page 26) table.
Page 27
Protections Browser
Sorting Protections
Filtering by information type has a draw-back: you have to know valid values for the information. In the beginning, you might find it more convenient to sort the list rather than filter it.
Advanced Sorting
You can sort the list with multiple criteria: first sort by criteria A and then by criteria B. For example, if you wanted to see protections that are marked for Follow Up, but you want to start with the most critical protections, you can sort by Follow Up and by Severity.
2. Choose the column headers by which you want to sort the list and then click OK.
Protections Browser
Protection Parameters
Most protections have graded parameters, provided to help you decide which protections to activate for security and which can be safely deactivated, for connectivity and performance. The protection parameters and their values for a specific protection appear at the top of the protection window.
Table 4-2 Explanation of Protection Parameters Parameter Type (on page 29) Indicates Type of machine that can be affected/protected Values Signature, Protocol Anomaly, Application Control, Engine Settings Low, Medium, High, Critical
How well an attack can be correctly Low, recognized Medium-Low, Medium, Medium-High, High Low, Medium, High, Critical Servers, Clients, Servers and Clients
Performance Impact (on How much this protection affects page 31) the gateway's performance
Type
The Type is whether the protection is a Signature, Protocol Anomaly, Application Control, or Engine Setting. Table 4-3 Types Type Signature Description Prevent or detect threats by identifying an attempt to exploit a specific vulnerability Usage Example Microsoft Message Queuing contains a vulnerability that could allow an attacker to remotely execute code; you activate the applicable Microsoft Message Queuing protection to protect against such an attack.
Page 29
Protections Browser
Description Prevent or detect threats by identifying traffic that does not comply with protocol standards
Usage Example An attacker can send HTTP packets with invalid headers in an attempt to gain access to server files; you activate the Non Compliant HTTP protection to protect against such an attack. Your organization decides that users should not use Peer to Peer applications at the office; you activate the Peer to Peer Application Control protections. Configuring settings will influence other protections; be sure to read any notes or warnings that are provided.
Application Control
Engine Setting
IPS protections are divided by these types under Protections > By Type. For example, view all Application Controls supported by IPS by selecting Protections > By Type > Application Control.
Protection Mode
Each protection has a mode, which determines whether IPS inspects packets for this protection, and if so, what it does if the packet matches a threat symptom. Inactive: Active: Packets are not inspected for this protection. Packets are inspected and actions taken (depending on Detect or Prevent). Packets are inspected and threatening packets or connections are dropped. Packets are inspected and threatening packets or events are tracked.
Prevent:
Detect:
The next sections, that explain the protections in detail, assume that the protection is Activated, to explain the configuration options that are available only when the protection is Active. If the IPS policy settings cause a protection to be Inactive, and you want to activate it, select Override with the action: and choose Prevent or Detect from the drop-down list. Some protections may be Partially active: the protection settings configured to activate the protection for specific protocols or situations, leaving it inactive for others. For example, in DNS - General Settings, you can select to activate DNS protections only for TCP or only for UDP, so the protections in the DNS category are Partially active. If you select to activate DNS protections for both TCP and UDP, the protections will be Active. The mode of a protection is per-profile. See Managing Profiles (on page 23).
Severity
You should activate protections of Critical and High Severity, unless you are sure that you do not want this particular protection activated.
Page 30
Protected Servers
For example, if a protection has a rating of Severity: High, and Performance Impact: Critical, you might want to determine whether the protection is necessary for your specific environment before activating the protection.
Confidence Level
Some attack types are more subtle than others, and legitimate traffic may sometimes be mistakenly recognized as a threat. The confidence level value indicates how well this particular protection can correctly recognize the specific attack. The Confidence parameter can help you troubleshoot connectivity issues with the firewall. If legitimate traffic is blocked by a protection, and the protection has a Confidence level of Low, you have a good indication that more specific configurations might be needed on this protection.
Performance Impact
Some protections by necessity use more resources or apply to common types of traffic, causing an adverse affect on the performance of the gateways on which they are activated. Note -The Performance Impact of protections is rated based on how they will affect gateways of this version running SecurePlatform and Windows operating systems. The Performance Impact on other gateways may vary from the rating listed on the protection. For example, you might want to ensure that protections that have a Critical or High Performance Impact are not activated unless they have a Critical or High Severity, or you know the protection is specifically needed. If your gateways experience heavy traffic load, be careful about activating High/Critical Performance Impact protections on profiles that affect a large number of mixed (client and server) machines. Using the value of this parameter to decide upon an optimal protection profile will prevent overloading your gateway's resources.
Protection Type
Signature and Protocol Anomaly protections are designed to protect against threats that target either Servers or Clients. You can use this information to define a profile that will only focus on the threats that can exploit the network resources behind your enforcing gateway, thereby reducing the performance impact on the gateway and the amount of logs which the gateway will produce. For example, if you have an enforcing gateway which protects servers in a DMZ, you can apply a profile that deactivates the Client protections because the client vulnerabilities are most likely not present on the protected resources.
Protected Servers
Certain protections are designed to inspect traffic based on the type of server that the traffic is coming to or from. To allow these protections to identify the traffic that should be inspected, IPS requires you to identify the DNS, Web and Mail servers you want to protect.
DNS Servers
The DNS protocol protections prevent illegal DNS packets over TCP or UDP, prevents users from accessing blocked domain addresses, protect from DNS Cache Poisoning, and block DNS traffic to non-DNS destinations. These protections will only apply to servers that are defined as DNS Servers in Protections > By Protocol > IPS Software Blade > Application Intelligence > DNS > DNS Servers View .
Page 31
Protected Servers
Web Servers
The Web protocol protections prevent attacks that use web protocols and vulnerabilities to damage your network or use your network resources to attack other networks. Web servers require special protection from these attacks. You can manage the use of these protections on Web Server from Protections > By Protocol > IPS Software Blade > Web Intelligence > Web Servers View.
Page 32
Protected Servers
Mail Servers
The Mail protocol protections prevent improper POP3, IMAP and SMTP traffic from damaging your network. These protections will only apply to servers that are defined as Mail Servers in Protections > By Protocol > IPS Software Blade > Application Intelligence > Mail > Mail Servers View .
Page 33
Chapter 5
Configuring Specific Protections
IPS contains a large array of protections that prevent attacks, protect against vulnerabilities in network protocols, and close unnecessary entry points into the network. In SmartDashboard, each protection is accompanied by a description of the protection as well as other useful information. You can find here instructions for configuring some of the more commonly used protections. In This Chapter Configuring Network Security Settings Configuring Application Intelligence Configuring Web Intelligence Managing Application Controls Configuring Geo Protections Included Protections: Aggressive Aging Configurations Anti Spoofing Configuration Status Citrix ICA Configuring Web Intelligence Protections Connectivity/Performance Versus Security Customizable Error Page DShield Storm Center FTP Instant Messengers IP Fragments Mail Microsoft Networks MS-RPC Peer-to-Peer Receiving Block List Remote Control Applications SNMP Streaming Engine Settings VoIP VPN Protocols 35 35 42 43 46 45 38 40 41 37 39 40 43 40 35 43 42 35 42 42 34 39 43 47 47
Page 34
2. Select the aggressive timeouts that you want to be enforced, and change the default values as needed. The Aggressive Aging value must be lower than the default session timeouts. As the regular values can also be changed, it is recommended that you review them before changing the aggressive timeout values. To see regular timeouts: click Policy menu > Global Properties > Stateful Inspection. These settings are global to all profiles and all gateways. Table 5-4 Aggressive Aging Timeouts IP Protocol/State TCP Start Session TCP Session TCP End Session UDP virtual session ICMP virtual session Aggressive Timeout (sec) 5 600 3 15 3 Regular Timeout (sec) 25 3600 20 40 30
Note -If you want to set an aggressive timeout on another protocol, you can select Other IP Protocols Virtual Session. The default for the Stateful Inspection timeout is 60 seconds. If you select this option in the Aggressive Timeout page, the default aggressive timeout is 15 seconds.
Configuring Thresholds
Now that you have the two different sets of timeouts, when is Aggressive Aging enforced over the regular timeouts? The major benefit of Aggressive Aging is that it starts to operate when the machine still has available memory and the connections table is not entirely full. Thus, it reduces the chances of connectivity problems that might have occurred under low-resource conditions. Aggressive Aging is activated according to thresholds to the memory consumption or the connections capacity that you configure. If a defined threshold is exceeded, each incoming connection triggers the deletion of ten connections from the Eligible for Deletion list. An additional ten connections are deleted with every new connection until the threshold falls below the enforcement limit. If there are no Eligible for Deletion connections, no connections are deleted at that time, but the list is checked after each subsequent connection that exceeds the threshold.
Page 36
3. Configure the limits for the Connections table and Memory consumption. Default is 80%, with connections from the Eligible for Deletion list being deleted if either the Connections table or Memory consumption passes this limit. You can change this default by selecting one or the other: Connections table exceeds __% of its limit Memory consumption exceeds __% of the gateway's capacity The limits for the Connections table and Memory consumption are set for each profile, so may be different for different gateways. Timeout settings are a key factor in memory consumption configuration. When timeout values are low, connections are deleted faster from the table, enabling the firewall to handle more connections concurrently. When memory consumption exceeds its threshold, it is best to work with shorter timeouts that can maintain the connectivity of the vast majority of the traffic. Note - If a SecureXL device does not support Aggressive Aging, the feature is disabled. When this happens, the action is logged and a console message is generated.
IP Fragments
IP packets may legitimately be fragmented. For example, some connections might go through a network with an MTU with a smaller packet size limit. This MTU will then break up larger packets into IP fragments, and the destination re-assembles the fragments into packets. A security threat exists, with the possibility of an attacker deliberately breaking a packet into fragments and inserting malicious data, or holding back some fragments to cause a Denial of Service attack by consuming the resources needed to store the fragments until the packets can be re-assembled. IPS provides optional protections against IP fragment threats. Forbid IP Fragments: the most secure option, but it may block legitimate traffic. Configure IP Fragment limits: set the maximum number of packets that the gateway will hold, with a timeout, to release resources and prevent DoS attacks. Capture Packets: track IP fragments and capture the data for observation and troubleshooting (see Working with Packet Information (on page 53)).
Page 37
Blocking IP Fragments
To configure a IPS profile to block all IP fragments: 1. Open the Network Security > IP and ICMP > IP Fragments page. 2. Select Forbid IP Fragments. All IP fragments will be blocked; fragmented packets will be dropped.
Page 38
CPDShield Any
4. Place the Block List rule as high as possible in the Firewall Rule Base, but below all authentication rules and any other rules for trusted sources that should not be blocked. 5. To retrieve and block malicious IPS only at particular gateways, specify them in the Install On cell of the rule. Note - Ensure that the Block List is enforced on perimeter gateways ONLY. 6. Install the security policy.
Authenticity is Assured
The Block List is securely transferred and authenticated through SSL. The Certificate of the Storm Center Certificate Authority, which comes with the Storm Center module, is stored locally and serves to verify the authenticity of the origin of the received Block List. The Certificate Authority of SANS DShield.org is Equifax. equifax.cer is the file name of the locally stored certificate, which is stored in the conf directory of the Storm Center module installation.
Mail
You can activate protections for the protocols that your environment uses for mail, adding customized security to the Mail servers that are already in place. Various settings and specific definitions are available in the Mail protection pages; see the following subsections.
The Select Servers windows appears with all of the Mail servers selected by default. 5. Clear the servers on which POP3 and IMAP protections should not be enforced, or click Add to add more hosts to this list, if needed. Defining POP3 Commands The POP3/IMAP Security protection has a list of commands that IPS will recognize and inspect. The definitions of the POP3 commands apply to all IPS profiles.
FTP
You can configure various protections related to the FTP protocol. For example, activating (on Prevent) the Block Port Overflow protection, will check and prevent any attempt to use an FTP server as an agent for a malicious operation. You can create a Black List of FTP commands that will be blocked, by moving commands to the Blocked Commands list on the Blocked FTP Commands page.
Microsoft Networks
The protections in this category refer to the CIFS protocol and protection against File and Print Sharing worms. IPS uses pattern matching to recognize and block worms. You can add or edit to the pattern lists in the File and Print Sharing protection against worms. These definitions apply to all profiles.
Peer-to-Peer
IPS can block peer-to-peer traffic by identifying the proprietary protocols, even if the application switches ports, and preventing the initial connection to the peer to peer networks. This not only prevents, but also searches operations. The pages in this category are all Application Control: activate them to enforce company policy against peer-to-peer applications; they do not protect against malicious behavior.
Configuring Specific Protections Page 40
Exclude network objects from <application type> detection: allow certain machines to use the application services. 3. For each setting selected, click Configure. 4. In the window that opens, select each service or object that you want to exclude from these application blocking controls and click Add.
Instant Messengers
You can block Instant Messaging applications, or any of the features. For example, you could allow MSN Messenger Chat, but block Video.
Page 41
Exclude network objects from <application type> detection: allow certain machines to use the application services. 3. For each setting selected, click Configure. 4. In the window that opens, select each service or object that you want to exclude from these application blocking controls and click Add.
VoIP
Voice and video traffic must to be protected as it enters and leaves a network. Potential threats to voice and video traffic are: Call redirections whereby calls intended for one recipient are redirected to another. Stealing calls, where the caller pretends to be someone else. System hacking using ports opened for VoIP connections.
VoIP calls involve a series of complex protocols, each of which can carry potentially threatening information through many ports. IPS ensures that caller and recipient addresses are valid and that the caller and recipient can make and receive VoIP calls. IPS also examines the contents of the packets passing through every allowed port to ensure that they contain the proper information. Full stateful inspection on H.323, SIP, MGCP and SCCP commands ensures that all VoIP packets are structurally valid and that they arrive in a valid sequence.
SNMP
IPS enables you to protect against SNMP vulnerabilities by providing the option of enforcing SNMPv3 (the latest SNMP version) while rejecting previous versions. In addition, IPS can allow all SNMP versions while dropping requests with SNMPv1 and SNMPv2 default community strings.
VPN Protocols
IPS enables you to configure enforcement of RFC 2637: Point-to-Point Tunneling Protocol on Virtual Private Networks.
Citrix ICA
The Independent Computing Architecture (ICA) protocol specifies platform-independent data transfer between server and clients over the Internet and intranets. Applications built on ICA are numerous: browsers, Microsoft Accessories, mail clients, and more. IPS can protect against various ICA-related vulnerabilities and can enforce protocol compliance.
The new or changed application names appear immediately in the Authorized Applications list.
MS-RPC
IPS contains a variety of protections which prevent attacks that use the MS-RPC protocol. This group of protections primarily checks that the MS-RPC packets meet the protocols standards, but also prevents the use of MS-RPC operations that can be used to gain access to internal information. The MS-RPC protection group also protects against improper use of DCOM. Note - By default, DCOM is blocked. To allow DCOM traffic, navigate to the DCOM - General Settings protection and select the Allow DCE-RPC interfaces other than End-Point Mapper (such as DCOM) on Port 135 checkbox. Additionally, IPS includes protections specifically for MS-RPC over CIFS which block certain functions of MS-RPC interfaces that may be misused.
Page 43
Application Layer
This class of protection prevents hackers from introducing text, tags, commands, or other characters that a Web application will interpret as special instructions. Introducing such objects into forms or URLs can allow a hacker to steal private data, redirect a communication session to a malicious website, steal information from a database, gain unauthorized access, or execute restricted commands.
Page 44
Command Injection 2. Click Edit (in the upper part of the page). 3. Do one of the following: To add a new command or DN, click Add. A new item in the list is created. Provide the command or DN that you want to add and then click OK.
To change an existing command or DN, select the command and click Edit. Change the command or DN as needed and then click OK. The block list is updated immediately.
Information Disclosure
Application Intelligence is a set of technologies that detect and prevent application-level attacks by integrating a deeper understanding of application behavior into network security defenses. These protections prevent an attacker from gathering information about a website. The goal of information disclosure is to obtain information from the Web server that can be used to tailor an attack.
Redirect to other URL: sends the browser to the URL that you configure here. If you select the Send error code checkbox, the reject ID and error code are sent to the client browser as parameters in the redirect response to the new location. 6. Click OK.
Page 45
Reject ID
The Reject ID that appears on the error page, or is sent after a redirect, delivers information to the administrator without exposing it to a potential attacker. The Reject ID is unique for each rejected connection. The Reject ID also appears in the SmartView Tracker and allows the administrator to correlate between an error and a log record of a specific connection. The log record contains attack information, such as "Cross site scripting detected". Note - Sometimes an Error Description ID may also be sent. It is used to identify attacks detected by specific protections. It appears in the SmartView Tracker log and corresponds to a SecureKnowledge solution about the attack: a SecureKnowledge search for the ID will give you information about the attack.
Although applying these restrictions (activating these protections) is in general good practice, they may potentially block valid sites or important applications. Applying these protections to specific Web servers can solve the connectivity problems, and may enhance CPU performance. This exclusion of a Web server from a particular protection is global to all profiles.
Page 46
The Check Point Security Gateway provides a number of Web security capabilities that do not require the Web Intelligence feature. These capabilities make use of the HTTP Security server. The performance provided by the HTTP Security server is not as high as that provided by the kernel. These capabilities are available by defining a URI Resource and using it the Firewall Rule Base.
Page 47
d) Click OK. 5. Configure a Policy for Other Countries. These settings apply to all countries and IP addresses that are not included in the Policy for Specific Countries. Configure whether to Allow or Block, and a Track setting. 6. If necessary define Exceptions (see "Configuring Network Exceptions" on page 55). Exceptions are applied before any other defined rule.
Page 48
Page 49
Page 50
Chapter 6
Monitoring Traffic
In This Chapter Monitoring Events using SmartView Tracker Working with Packet Information Allowing Traffic using Network Exceptions Tracking Protections using Follow Up 51 53 54 56
Page 51
Monitoring Traffic
Page 52
Monitoring Traffic
Page 53
5. Select Internal Viewer and click OK. You may also use a third-party packet capture application by selecting Choose program and specifying the application in the Program Name field.
Monitoring Traffic
Page 54
For example, let's assume you have created a number of profiles and activated the relevant protections. Afterwards, you decide that a specific gateway should allow instant messaging. The profile of this gateway blocks instant messaging, and other gateways have the same profile. You can make an exception for the one gateway without creating another profile or changing your requirements.
To configure an exception:
1. Open the Network Exceptions page. 2. Click New. The Add/Edit Exception Rule window opens.
3. From the Profile drop-down list, select an existing profile to which this exception will be added, or select Any, to apply the network exception to all profiles. 4. In the Scope area, select the protection that will be affected by this exception: All supported protections: IPS will exclude traffic from inspection based on source, destination, or service; this effectively turns off IPS inspection for the traffic that matches the exceptions. Protections that do not support the Network Exceptions feature will not be affected. Single enforcement: Click Select and select a protection. This selected protection will not inspect traffic that matches the exceptions, even if it is activated in the profile.
Monitoring Traffic
Page 55
5. Define the Source and Destination: Select Network Object and then click Manage; or select IP Address and provide the IP Address in the field. Source: Provide the SmartDashboard Network Object that represents the source for the exception. The selected protection will not be inspected if the traffic comes from this source. For example, you could provide the static IP Address of the CEO's laptop, ensuring that anything coming from this laptop is allowed. Destination: Provide the SmartDashboard Network Object that represents the destination for the exception. The selected protection will not be inspected if the traffic is going to this destination. For example, you could provide the DMZ network object as the destination, allowing all traffic to reach the outer walls of your network. If you want to make the exception applicable to all machines, basing it on a service or protection rather than source or destination, select Any. 6. Define the Service: Leave Any selected if this exception is to be applicable to all services on provided Source or Destination.
Click Manage and select a service to allow traffic of this service to be passed without exception. 7. Select the gateways on which this exception is to be installed: Apply this exception on all R70 gateways (and above): The exception will be applied to all matching gateways.
Apply this exception on: From the drop-down list of gateways of version R70 and above, select a single gateway. 8. Add a comment for management and click OK. Tip: When creating a Network Exception, you define a rule that includes Source, Destination, and Service. If you set all three of these parameters to Any, you are essentially deactivating the protection. If this is what you want, you should not create the Network Exception; you should deactivate the protection from its page. When the protection is set to Inactive from its page, it is easy to see its action mode, to understand why its traffic is not blocked, and to change the action if needed. If a protection is deactivated by a Network Exception, it may appear to be activated while not actually protecting your environment.
Monitoring Traffic
Page 56
The Select Protection window opens. Here you may select a single protection; you cannot select categories or settings.
2. Select the protection you want to mark for Follow Up. 3. Click OK.
Monitoring Traffic
Page 57
4. Edit the comment, if you want. By default, it shows that the protection was marked for Follow Up (manually) on the current date and time. 5. Click OK.
Monitoring Traffic
Page 58
Click the Unmark link to unmark a protection and remove it from the Follow Up list.
Click the Undo link to change back to being marked. Click the Hide link to remove the "Follow Up Removed" banner.
Monitoring Traffic
Page 59
Chapter 7
Optimizing IPS
IPS is a robust solution for protecting your network from threats. Implementing the following recommendations will help maintain optimal security and performance. During the tuning process, keep in mind that Check Point bases its assessment of performance impact and severity on an industry standard blend of traffic, placing greater weight on protocols such as HTTP, DNS, and SMTP. If your network traffic has high levels of other network protocols, you will need to take that into consideration when assessing inspection impact on the gateway or severity of risk to an attack. In This Chapter Managing Performance Impact Tuning Protections Enhancing System Performance 60 62 63
Page 60
None does not specify a group of hosts or networks for protection. When no topology is configured, the IPS-1 Sensor inspects all traffic with a lower level of intensity. The IPS-1 Sensor will inspect traffic faster but without the high level of inspection provided by the All IPs and Manually defined settings.
2. Select a gateway with critical load issues and click Edit. The IPS page of the Gateway Properties window opens.
Optimizing IPS
Page 61
Tuning Protections
3. Select Bypass IPS inspection when gateway is under heavy load. 4. To set logs for activity while IPS is off, in the Track drop-down list, select a tracking method. 5. To configure the definition of heavy load, click Advanced.
6. In the High fields, provide the percentage of CPU Usage and Memory Usage that defines Heavy Load, at which point IPS inspection will be bypassed. 7. In the Low fields, provide the percentage of CPU Usage and Memory Usage that defines a return from Heavy Load to normal load. 8. Click OK to close the Gateway Load Thresholds window.
Tuning Protections
Profile Management
IPS profiles allow you to apply all of the protections as a group to specific gateways.
Optimizing IPS
Page 62
Optimizing IPS
Page 63
CoreXL
For SecurePlatform gateways running on multi-core hardware, installing CoreXL on the gateway will allow the gateway to leverage the multiple cores to more efficiently handle network traffic. For more information on CoreXL and optimizing the CoreXL configuration, see the R75 Firewall Administration Guide (http://supportcontent.checkpoint.com/documentation_download?ID=11660).
Optimizing IPS
Page 64
Chapter 8
Updating Protections
In This Chapter IPS Services Managing IPS Contracts Updating IPS Protections 65 65 65
IPS Services
IPS Services maintains the most current preemptive security for the Check Point security infrastructure. To help protections stay continuously ahead of today's constantly evolving threat landscape, IPS Services provide ongoing and real-time updates and configuration advice for protections and security policies found in IPS. IPS Services include useful tools such as: Protection Updates Preemptive, ongoing and real-time protection updates, including new protection capabilities for emerging protocols and applications Advisories Step-by-step instructions on how to activate and configure protections against emerging threats and vulnerabilities, usually before exploits are created by hackers Security Best Practices The latest security recommendations from Check Point Microsoft Security Page Extensive coverage of Microsoft Security Bulletins and methods to protect your Microsoft environment
For more information about the full range of IPS Services, go to: http://www.checkpoint.com/defense/advisories/public/index.html (http://www.checkpoint.com/defense/advisories/public/index.html)
Page 65
To obtain updates of all the latest protections from the IPS website:
In the IPS tab, select Download Updates and click Update Now. If you chose to automatically mark new protections for Follow Up, you have the option to open the Follow Up page directly to see the new protections.
Updating Protections
Page 66
To run the updates at a time interval, you must choose Every day in the Days tab. b) In the Days tab, choose the days that the update will run. You can choose to run the update either: Every day On specified days of the week On specified days of the month
c) Click OK to save the schedule. The resulting schedule is shown in the Scheduled Event Properties window. 4. Click User Center credentials to enter you User Center username and password. The User Center credentials are stored. These credentials are also used to check the status of your IPS contracts. Once you set up a schedule, you can also choose these options: On update failure perform X retries lets you to specify how many tries the Scheduled Update will make if it does not complete successfully the first time. On successful update, perform Install Policy automatically installs the policy on the devices selected using Edit Settings once the IPS update is completed. Both the IPS and Firewall policies install on gateways with the IPS Software Blade enabled.
Updating Protections
Page 67
Appendix A
Regular Expressions
In This Appendix Overview of Regular Expressions Metacharacters Internal Options Earlier Versions 68 68 72 72
Metacharacters
Some metacharacters are recognized anywhere in a pattern, except within square brackets; other metacharacters are recognized only in square brackets. The Check Point set of regular expressions has been enhanced for R70 and above. The following table indicates if earlier versions do not support use of a given metacharacter. Metacharacter \ (backslash) Meaning Earlier? See Backslash (on page 69)
escape character, and partial other meanings character class definition subpattern min/max quantifier match any character zero or one quantifier yes
[ ] (square brackets)
Parentheses (on page 70) Curly Brackets (on page 71) Dot (on page 70) Question Mark (on page 71) Asterisk (on page 71) Plus (on page 71)
Page 68
Metacharacters
Meaning
Earlier?
See Vertical Bar (on page 72) Circumflex Anchor (on page 72)
start alternative branch yes anchor pattern to beginning of buffer anchor pattern to end of buffer yes
$ (dollar anchor)
yes
Backslash
The meaning of the backslash (\) character depends on the context. The following explanations are not all supported in earlier versions; see Earlier Versions (on page 72) for details. In R70 and above, backslash escapes metacharacters inside and outside character classes.
Escaping Symbols
If the backslash is followed by a non-alphanumeric character, it takes away any special meaning that character may have. For example, \* matches an asterisk, rather than any character. Also, you can escape the closing bracket with a backslash [\]]. If the protection against the pattern is for earlier gateways as well as for newer ones, do not write one backslash inside square brackets. Instead, write two backslashes if you want to have a literal backslash inside square brackets. You cannot use \ to escape a letter that is not a metacharacter. For example, because "g" is not a metacharacter, you cannot use \g.
Regular Expressions
Page 69
Metacharacters
Square Brackets
Square brackets ([ ]) designate a character class and match a single character in the string. Inside a character class, only the character class metacharacters (backslash, circumflex anchor and hyphen) have special meaning. You must use a backslash when you use character class metacharacters as literals inside a character class only. Square brackets that are used as literals must always be escaped with backslash, both inside and outside a character class. For example, [[abc] should be written: [\[abc]
Table 8-5 Character Class Metacharacters Metacharacter \ (backslash) ^ (circumflex anchor) Meaning general escape character negate the class, if this is the first character in the brackets (If ^ is not the first, it is not a metacharacter.) indicates character range
Parentheses
Parentheses ( ) designate a subpattern. To match with either an open-parenthesis or closing-parenthesis, use the backslash to escape the symbol.
Hyphen
A hyphen '-' indicates a character range inside a character class. When used as a simple character in a character class, it must be escaped by using a backslash '\'. For example: [a-z] matches the lower-case alphabet.
Dot
Outside a character class, a dot (.) matches any one character in the string.
Regular Expressions Page 70
Metacharacters
For example: .* matches zero or more occurrences of any character Inside a character class, it matches a dot (.).
Quantifiers
Various metacharacters indicate how many instances of a character, character set or character class should be matched. A quantifier must not follow another quantifier, an opening parenthesis, or be the expressions first character. These quantifiers can follow any of the following items: a literal data character an escape such as \d that matches a single character a character class a sub-pattern in parentheses
Curly Brackets
Curly brackets ({ }) are used as general repetition quantifiers. They specify a minimum and maximum number of permitted matches. For example: a{2,4} matches aa, aaa, or aaaa If the second number is omitted, but the comma is present, there is no upper limit; if the second number and the comma are both omitted, the quantifier specifies an exact number of required matches. For example: [aeiou]{3,} matches at least 3 successive vowels, but may match many more \d{8} matches exactly 8 digits
Note - A closing curly bracket '}' that is not preceded by an opening curly bracket '{' is treated as a simple character. However, it is good practice to use a backslash, '\}', when using a closing curly bracket as a simple character.
Question Mark
Outside a character class, a question mark (?) matches zero or one character in the string. It is the same as using {0,1}. For example: c([ab]?)r matches car, cbr, and cr Inside a character class, it matches a question mark: [?] matches ? (question mark).
Asterisk
Outside a character class, an asterisk (*) matches any number of characters in the string. It is the same as using {0,}. For example: c([ab]*)r matches car, cbr, cr, cabr, and caaabbbr Inside a character class, it matches an asterisk: [*] matches * (asterisk).
Plus
Outside a character class, a plus (+) matches one or more characters in the string. It is the same as using {1,}. For example: c([ab]+)r matches character strings such as car, cbr, cabr, caaabbbr; but not cr
Regular Expressions
Page 71
Internal Options
Vertical Bar
A vertical bar (|) is used to separate alternative patterns. If the right side is empty, this symbol indicates the NULL string: a| matches a or empty string. For example: a|b matches a or b
Circumflex Anchor
A circumflex anchor (^; also known as a caret) is used to match only the beginning of a buffer. The circumflex is treated as an anchor only when it is the first character in the pattern and can also be used to negate a character class, but only if it is the first character of the class. A circumflex anchor that is used as literal must always be escaped with backslash, both inside and outside character class.
Dollar Anchor
A dollar anchor ($) is used as a metacharacter only if it is the last character of a pattern and only to match the end of a buffer. A dollar anchor that is used as literal must be escaped with backslash when it is not inside a character class. For example: ab$ matches a string that ends in ab
Internal Options
To configure for compilation options from within the pattern, enclose the option strings between curly brackets, with a colon at the end: { }: To specify multiple option strings, use the semicolon (;) as a separator. An internal option setting must appear at the beginning of the pattern, and are applied to the whole pattern. For example: {case;literal}:*a matches the string "*a" The option strings are described in the following table. Table 8-6 Internal Option Strings Option String case caseless literal Description Treat all characters in the pattern as case-sensitive Treat all characters in the pattern as case-insensitive Treat all characters in the pattern as literals (metacharacters are treated as regular characters) Force string to be the pattern's LSS
LSS(string)
Earlier Versions
If you have gateways of earlier versions, and you create a regular expression for a protection enabled on such a gateway, IPS checks if the pattern is supported. If a pattern does not support both earlier versions and the new version of Check Point regular expressions, you are notified.
Regular Expressions
Page 72
Earlier Versions
If you have earlier gateways as well as newer ones, and you want to configure a protection against a pattern, you can do one of the following: Change the pattern to use metacharacters that are supported by both the newer version of Check Point software and the earlier versions. Configure GUIDBedit for both patterns.
Regular Expressions
Page 73
Index
A
Activating Protections 19 Activating Protections for a Specific Profile 22 Activating Protections for All Profiles 22 Activation Settings 9 Adding IPS Software Blade Gateways 15 Adding IPS-1 Sensors 16 Adjusting Allowed Concurrent HTTP Connections 47 Advanced IPS Protection 13 Advanced Sorting 28 Aggressive Aging Configurations 35 Allowing Traffic using Network Exceptions 53 Anti Spoofing Configuration Status 35 Application Layer 44 Assigning Profiles to Gateways 23 Asterisk 69 Attaching a Packet Capture to Every Log 52 Authenticity is Assured 39 Automatically Activating Protections 19 Automatically Marking New Protections for Follow Up 57
Defining Allowed Applications 42 Defining Commands and Distinguished Names 44 Defining DNS Servers 31 Defining HTTP Worm Patterns 44 Defining Mail Servers 33 Defining Peer to Peer HTTP Headers 41 Defining Web Servers 32 Deleting Profiles 24 DNS Servers 31 Dollar Anchor 70 Dot 68 DShield Storm Center 38
E
Earlier Versions 70 Editing DNS Servers 32 Editing Mail Servers 33 Editing Web Servers 32 Encoding Non-Printable Characters 67 Enforcing Gateways 8 Enhancing System Performance 61 Escaping Symbols 67 Exporting Protections List 28
F
Filtering Protections 27 Finding Protections 27 Focus on High Confidence Level Protections 61 Focus on High Severity Protections 61 Focus on Low Performance Impact Protections 61 FTP 40 Functions for Monitoring 9
B
Backslash 67 Basic IPS Protection 12 Blocking IP Fragments 38 Bypass Under Load 14, 59
C
Changing the Assigned Profile 13 Choosing the Level of Protection 12 Circumflex Anchor 70 Citrix ICA 42 Cluster Failover Management 60 Confidence Level 31 Configuring Aggressive Timeouts 35 Configuring Application Intelligence 39 Configuring Geo Protections 47 Configuring IP Fragments Thresholds 37 Configuring Network Exceptions 53 Configuring Network Security Settings 34 Configuring Specific Protections 34 Configuring Thresholds 36 Configuring Update Options 64 Configuring Web Intelligence 43 Configuring Web Intelligence Protections 43 Connectivity/Performance Versus Security 46 Controlling Traffic by Country 48 CoreXL 62 Creating Profiles 18 Curly Brackets 69 Customizable Error Page 45 Customizing Profiles for IPS-1 Sensors 25 Customizing the Protections Browser View 26
G
Gateway Protection Scope 58 Getting Started with IPS 12
H
HTTP Protocol Inspection 45 Hyphen 68
I
Important Information 3 Importing an Update Package 65 Importing and Exporting Profiles 24 Improving Connectivity by Setting Scope 46 Improving Security for Specific HTTP Formats 45 In My Organization 10 Information Disclosure 45 Installing the Policy 14 Instant Messengers 41 Instant Messengers General Exclusion Settings 41 Internal Options 70 IP Fragments 37 IPS Overview 9 IPS Policy Settings 61 IPS Profiles 18 IPS Services 63 IPS Terminology 8
D
Default Protection 12
L
Log Aggregation by Country 49 Log Size and Effect on Gateway Performance 39
Regular Expressions 66 Reject ID 46 Remote Control Applications 43 Removing Activation Overrides 22 Retrieving and Blocking Malicious IPS 38 Reviewing New Protections 65
M
Mail 39 Mail Servers 32 Malicious Code 43 Connectivity Versus Security 44 Managing Application Controls 47 Managing Gateways 15 Managing IPS Contracts 63 Managing Performance Impact 58 Managing Profiles 23 Managing Profiles and Protections 18 Manually Activating Protections 21 Manually Configuring the Blocking of Malicious IPS 38 Marking Protections for Follow Up 55 Marking Protections from Follow Up Page 55 Marking Protections from Protection Details 56 Messages and Action Items 10 Metacharacters 66 Microsoft Networks 40 Monitoring Events using SmartView Tracker 50 Monitoring Traffic 50 MS-RPC 43
S
Scheduling IPS Updates 64 Security Center 11 Security Status 10 Separate Profiles by Gateway Version 61 Separate Profiles by Segment 60 Setting POP3/IMAP Scope 39 Severity 30 SNMP 42 Sorting Protections 28 Specifying Character Types 68 Square Brackets 68 Streaming Engine Settings 35 Support for Backslash 71 Support for Circumflex and Dollar Anchors 71 Support for Hyphen 71 Support for Internal Option Settings 71 Support for Quantifiers 71 Support for Square Brackets 71
T
The Check Point IPS Solution 7 The IP Address to Country Database 49 Tour of IPS 8 Tracking Protections using Follow Up 55 Troubleshooting 14 Troubleshooting Profiles 25 Tuning Protections 60 Type 29 Types of Protections 9
O
Opening Protection Settings 51 Optimizing IPS 58 Overview of Regular Expressions 66
P
Parentheses 68 Peer to Peer General Exclusion Settings 41 Peer-to-Peer 40 Performance Impact 31 Performance Pack 61 Plus 69 Profile Management 60 Profiles 9 Protect Internal Hosts Only 14 Protected Servers 31 Protection Mode 30 Protection Parameters 9, 29 Protection Type 31 Protections 8 Protections Browser 26 Protections Implemented in Kernel Vs. Security Server 46
U
Unmarking Protections for Follow Up 57 Unmarking Protections from Follow Up Page 57 Unmarking Protections from Protection Details 57 Updating IPS Manually 64 Updating IPS Protections 63 Updating Protections 63
V
Vertical Bar 70 View Protected Gateways by Profile 23 Viewing IPS Event Details 50 Viewing IPS Events 50 Viewing Network Exceptions 53 Viewing Packet Capture Data in SmartView Tracker 52 Viewing Profile Modification Data 23 VoIP 42 VPN Protocols 42
Q
Quantifiers 69 Question Mark 69
R
Receiving Block List 35 Recommendations for Initial Deployment 13 Recommended Protection 13
W
Web Protection Scope 59 Web Servers 32 Working with Packet Information 52
Page 76
Page 77