VPN Tunnel: We Can Build A Tunnel in Check Point Firewall As
VPN Tunnel: We Can Build A Tunnel in Check Point Firewall As
VPN Tunnel: We Can Build A Tunnel in Check Point Firewall As
1. Encryption: Encryption can be done using DES, 3DES & AES Symmetrical Algorithms.
2. Data Integrity:- It can be done using Hashing algorithms such as MD5 & SHA.
3. Authentication: It can be done using Pre shared Keys.
We build the tunnel using IPsec Standards such as IKEv1, Ikev2. Here we use IKEv1 phase 1 &
phase2 to build an VPN tunnel.
1. In IKEV1 Phase 1 we use Negotiation (Data Integrity) such as Hashing Algorithms MD5 or SHA.
2. We use Encryption such as DES, 3DES or AES to unlock the Data.
3. Authentication can be done using Digital Certificates or Pre Shared Key using Diffie Hellman
algorithms.
4. Same steps are used to build IKEV2 tunnel also.
5. At last the Payload is encrypted its re encapsulated & put the packets in IPSEC Tunnel using
ikev2 phase tunnel. If somebody wants to snip the Packets from Outside. ESP protects it.
6. At last Encryption Security Payload Protocol 50 in Layer protects the IPsec tunnel & Secure from
unwanted access.
7. THE ESP encrypts the Packet from source Site in Destination It Decrypts the Packet & accepts it
by the Receiver.
1. In Checkpoint We call VPN as VPN Community for Entire Network As shown Below :
2. The Networks Such as 10.1.1.0 & 10.2.2.0 are called as Domains as shown above.
3. In Checkpoint we can Build VPN’S as Mesh VPN, Star VPN ,Central Hub & Spoke, Site to Site VPN.
4. In Checkpoint we can build Hub & Spoke as Central & Spoke as shown above in star.
7. After these Create a VPN Community by clicking More Option in Smart DashBoard & select IPSEC
VPN
8. Here we need to Create a New Community As shown Below:
17. Here Next in advanced Settings go & do the VPN Settings & Disable the NAT below:
18. Now here VPN Community is Identified as below:
19. Now get back to Firewall Tab & Create a new Rule to involve VPN Community:
20. Here we created the VPN Rule as Anything can be allow from 10.1.1 Network to 10.2.2 Network
21. Click on VPN Any Traffic, Click on Edit Cell To select VPN Communities
22. Here add our corp to Branch Community as shown Below:
24. In Policy Targets we nedd to Specify same Because this policy needs to be installed in both the
Firewalls
25. Then Install & Push the Policy in both the Firewalls.
26. To Check the Output we need to ping from 10.1.1 Network to 10.2.2.222 as below
31. Look the details Here it says Refer Rule 2 is dropped so make the Changes
32. Now Disable the Rule 2 & Push the Policy, Check the Output:
33. In Smart View Tracker Also check the Output:
38. Press 2
BACKUP & Restore:
1. Login to the Manager via Https as shown below, we have plenty of options.
2. To do Back up in CMD use: add Backup Command & press Tab Key
3. Authentication:
4. Select The Mobile Access in the Gateway
5. Click OK It shows:
6. Click Next & Give Outside IP address in Main URL Because Users will connect from outside
7. Specify the access Resources to outside as below we specify DMZ IIS server to access from
outside
10. Here we need to select the users to access the Applications. In this we have selected full active
Directory users to access such as LDAP Group
11. Click Next & Finish, Follow the Rules
18. To Block Certain Traffic from Different Country Use IPS tab As shown Below:
19. To Block this Turn on the Protection to Prevent as Shown Below:
20. Click on add & Block the Traffic from Kazakhstan foe example
21. Select Block
1. Blocking the Malware in Firewall Itself if any user tries to download Malicious File
2. Complaince Blade supports assistance of wrong rules creation.
3. In Smart Dash Board Management Itself We can do Changes for all the Gateways Such As DNS
Settings Etc in Centralized Management itself.
1. Routes also can be added in Smart Dashboard itself without logging to the HTTPS Gateway mode
2. We can Add DNS server here itself