VMware® ESX®/vSphere®, Linux® XEN®, and Microsoft® Hyper-V® are well-known virtualization solutions that enable multiple Virtual Machines (VMs) on a single server through the coordination of a hypervisor. A VM is an instantiation of a logical server that behaves as a standalone server, but it shares the hardware and network resources with the other VMs. The hypervisor implements VM to VM communication Full Article…
Search the Wiki
TSHOOT – useful ping, other commands
The combination of the ICMP echo request and echo reply messages are known as ping. They provide a simple diagnostic tool to find out if a host is reachable. In the cOS Core CLI, the ping command provides this feature. However in cOS Core the ping tool can be used to test much more than Full Article…
VPN
Before going deep to every VPN technology setup in cOS Core lets look on overview of common requirements: Define the Tunnel – Firstly we must define the tunnel itself. cOS Core has various tunnel object types which are used to do this, such as an IPsec Tunnel object. A Route Must Exist – Before any Full Article…
Address Translation
cOS Core supports two types of translation: Dynamic Network Address Translation (NAT) Static Address Translation (SAT) Two types of cOS Core IP rules, NAT rules and SAT rules are used to configure address translation. NAT Dynamic Network Address Translation (NAT) provides a mechanism for translating original source IP addresses to a different address. Outgoing packets Full Article…
ARP
Address Resolution Protocol (ARP) allows the mapping of a network layer protocol (OSI layer 3) address to a data link layer hardware address (OSI layer 2). In data networks it is used to resolve an IPv4 address into its corresponding Ethernet address. The ARP Cache in network equipment, such as switches and security gateways, is Full Article…
Access Rules
Before a new connection is checked against the IP rule set, cOS Core checks the connection source against a set of Access Rules. Access Rules can be used to specify what traffic source is expected on a given interface and also to automatically drop traffic originating from specific sources. AccessRules provide an efficient and targeted Full Article…
Clavister Routing
The components of a Route Interface – Interface where is the destination network Network – destination network itself Gateway – next hop IP address Local IP Address – something like secondary ip address. You can specify this on your physical interface and FW will reply to ARP for this IP. Where it is useful? When Full Article…
Security Policies
cOS Core security policies are configured by the administrator to regulate the way in which traffic can flow through the Clavister Security Gateway. Such policies are described by the contents of different cOS Core rule sets. These rule sets share a uniform means of specifying filtering criteria which determine the type of traffic to which Full Article…
Interfaces in Clavister FW
In every network device there is source and destination interface. In clavister there is also Core interface which refers to the clavister fw itself. cOS Core supports a number of interface types, which can be divided into the following four major groups: Ethernet Interfaces – Each Ethernet interface represents a physical Ethernet interface on a Full Article…
Services
A Service object is a reference to a specific IP protocol with associated parameters. A service definition is usually based on one of the major transport protocols such as TCP or UDP which is associated with a specific source and/or destination port number(s). For example, the HTTP service is defined as using the TCP protocol Full Article…
Clavister Address Book, Address Groups and Address Book Folders
The cOS Core Address Book contains named objects representing various types of IP addresses, including single IP addresses, networks as well as ranges of IP addresses. Ethernet MAC addresses can also be defined in the address book. IP Address objects are used to define symbolic names for various types of IP addresses. Depending on how Full Article…
Introduction to Clavister FW
Claviste FW is using cOS Core OS. Its OS running at the top of linux machine like in checkpoint. It is UTM firewall as it supports features like Routing, FW policies, NAT, ALG (application inspection), VPN, TLS termination, Application control, Anti-Virus scanning, IDS/IPS, Web content filtering, Traffic management (shaping, LB, QoS), HA, Virtualization, etc. cOS Full Article…
Remote access VPNs & additional CheckPoint features
To repeat the remote access VPN can be clientless and clientfull. Clientless is via ssl portal. From there client can access the most important resources via applets installed in the portal. If client want to use the clientfull VPN he has to have the client installed. He can download the client from the ssl portal. Full Article…
Smart Update
Imagine you are working for company which has many checkpoint gateways and their licensing vary for each of them. In some point these licenses are going to expire and you have to restore them and manage them remotely. You also would like to perform remote upgrades, patches and hot fixes of your devices. And for Full Article…
Backup and Recovery
We have lot of options for backups in checkpoint. Check the screen above. There is: DB Version – when we pushed out the policy we had option to create the backup of database. Inside of database are objects and policy. Backup – We already did this type of backup in the CLI. This includes the Full Article…
Site to Site VPNs
I know how the VPN works. There is IKE phase 1,2. In phase one there is HAGLE going on. In phase two HAGLE but HA is same, becasue (message + password) x hash is used for authentication and integrity check. Configuration of VPNs under checkpoint is very easy. In checkpoint there is some nomenclatures: vpn Full Article…
Checkpoint CLI
There is a CLI in checkpoint and we need to now bacics for some certain situations like restoring policy if we pushed some wrong one and management server cannot communicate with gateway. Or we would like to check the linux related stuff on the appliance like arp, ifconfig, routing. There are also some checkpoint commands Full Article…
Application control and URL filtering
In every company you would have something called acceptable use policy. In that policy there will be lots of rules and regulations about what users are allowed to do. One of the rules can be for example that you cannot go to certain website categories like facebook, gaming, torrents, porn, you name it… And what Full Article…
HTTPS inspection
Lets say employee wants to break security policy and use ssl tunnel in work to his home or to some vpn service on Internet. And via this encrypted tunnel he can access all he pages and he can do everything like he is indeed home. Checkpoint can do a HTTPS inspection and if employee is Full Article…
Identity awareness
How do we acquire the actual identity of users in your network? How do we acomplish that firewall will know the users and can map them to theirs specific IP address. Here are the possibilities: AD Query – when user logged into the AD the Security Event Logs triggers including also IP address info about Full Article…