Preface: Howto Set Up Certificate Based Vpns With Check Point Appliances - R80.X Edition
Preface: Howto Set Up Certificate Based Vpns With Check Point Appliances - R80.X Edition
Preface
Securing virtual private networks (VPNs) in enterprise Site-to-Site environments is an
important task for keeping the trusted network and data protected. Also it's critical to
avoid any loss of data sovereignty.
When it comes to VPN security many security experts first think of encryption
algorithms, perfect forward secrecy (PFS), Diffie-Hellman groups... and a long pre-
shared key (PSK).
Every security expert knows how much better certificates are for gaining high security
levels. Therefore certificates are always best practice in enterprise grade security
environments.
However, most VPN Site-to-Site setups are still based on simple, long lasting pre-
shared keys. In many cases these keys were even forgotten by the administrators in
charge of keeping the network secure because once configured for the VPN tunnel
they are not needed anymore.
This is because it's much quicker and really easy to set up a VPN with a simple pre-
shared key than having to deal with certificates and a certificate authority (CA).
But the comfort of choosing PSKs over certificates does not only minimize your
security level it also makes you vulnerable to potential attacks and is not as safe as
you might expect. Even if you pick a long PSK! This is because tools like 'ike-scan'
(also comes preinstalled with Kali Linux), pks-crack etc. make it really easy to crack
(it is important to notice that the 1500 SMB appliances can only be centrally managed
with R80.30 Jumbo Take_76 or R80.40 as mentioned in sk157412 and sk163296)
Centrally managed
Check Point is well-known for its superior security management solution to which all
Check Point gateways are connected. This central management approach makes it
remarkably easy to deploy security settings to all connected gateways with a single
click on policy installation.
First, create a VPN community for certificate based VPNs (Mesh or Star
topology)
Now let's take a closer look at the settings of the created VPN community.
Check the "Accept all encrypted traffic on: " box and select the "Both center and
satellite gateways" in the "Encrypted Traffic" tab.
Configure your preferred VPN encryption settings for Phase 1 (IKE) and Phase 2
(IPsec) and allow permanent tunnels if needed.
Leave the checkbox for pre-shared keys unchecked!
In the next step we want to activate and configure the needed IPSec VPN blade on the
participating gateways. There are two possible options to do this. You can activate the
blade in the “General Properties” tab on the gateway or during the installation when
using the “Wizard Method”.
Classic Method
Gateway :
RemoteOffice :
(end of Classic Method)
Wizard Method
Should the connection to the SMB appliance (in our case the "RemoteOffice") get lost
after the policy installation check the "Connection Persist" option and activate "Keep
all connections".
Locally managed
Check Point's 700 appliances are locally managed. So can be 1100 / 1400 /
1500 appliances.
Verify that the locally managed SMB appliance has Site-to-Site VPN enabled.
Import the internal_ca.crt file to your locally managed SMB appliance.
You may want to disable CRL checking if your Management as primary CRL
Distribution Point can't be reached or isn't resolvable.
Easy, isn't it? Now we want to export the SMB appliance's certificate to our
Management or (if you prefer) issue a certificate request to be signed by our
management's Internal CA.
Option A - Export the SMB appliance's certificate
Highlight the Internal CA of our SMB appliance (NOT the one we just imported),
then click "Export" and save the file.
Navigate to Manage > Servers and OPSEC Applications.. > New > CA >
Trusted select OPSEC PKI and open the tab OPSEC PKI to import our saved
SMB Internal CA file.
Again, you may want to disable CRL Checking if required.
You'll then find our imported SMB certificate 'CP1550' next to our internal_ca within
the Trusted CA list of our Management.
(end of Option A)
Go to VPN > Certificates > Installed Certificates and click New Signing Request to
generate a new certificate.
If required change the file name extension of the created certificate to .crt .
On the SMB appliance click 'Upload Signed Certificate', select the certificate and
click 'Complete'.
(end of Option B)
Now simply create an Externally Managed Check Point Gateway for our SMB
appliance and you are all set up and done.
When configurating the Matching Criteria for our SMB appliance, check
the DN box and paste the subject of our SMB appliance Default Certificate if you
took Option A.
In case of Option B first copy the DN of the created certificate from within ICA
Management Tool.
Thank you.