Вы находитесь на странице: 1из 45

MIGRATION TO R80.

10

Dameon D. Welch-Abernathy aka “PhoneBoy”


Cyber Security Evangelist

©2017 Check Point


©2017 Software
Check Point Technologies Ltd.
Software Technologies Ltd. [Restricted] for designated teams ​ 1
Explore the Top 3 posts on CheckMates

http://tiny.cc/amadorit

http://tiny.cc/r80videos http://tiny.cc/top3cli
©2017 Check Point Software Technologies Ltd. 2
Engage CheckMates on Mobile as well –
Download “Jive Daily” today

https://community.checkpoint.com

©2017 Check Point Software Technologies Ltd. 3


©2017 Check Point Software Technologies Ltd. [Internal Use] for Check Point employees​ 4
Agenda
• Why Should You Upgrade

• Hardware Requirements

• Staging the Management Upgrade

• Doing the Upgrade

©2017 Check Point Software Technologies Ltd. [Restricted] for designated teams ​ 5
What Is R80.10 About?

• Presenting a new architecture for the security gateway


̶ Improvements for existing customers
̶ SecureXL template support for Domain, Time and Dynamic objects
̶ VSX gateways can be upgraded in place and support more concurrent connections
• Providing visibility functionalities on the management server
̶ Session based logging
̶ Flexible event management and reporting
• Supporting delegation of duties
̶ Assign administrative roles to security policy layers and dedicated security
functions, for example creating a dedicated admin for IPS

©2017 Check Point Software Technologies Ltd. [Protected] Distribution or modification is subject to approval ​ 6
Security Policies Expressing Your Business Needs

• Unified Rule Base


̶ Creating layered policies allowing delegation of duties, large complex rule bases
without compromising performance
• Content Awareness
̶ Achieve content control for applications
• Session Logging
̶ Visualize the number of connections required and the amount of data being
transferred

©2017 Check Point Software Technologies Ltd. [Protected] Distribution or modification is subject to approval ​ 7
Security Policies Expressing Your Needs
Ordered Layers and Inline Layers
• Enforcing security using an ordered layered structure
̶ The upper most policy layer will be matched first 1
̶ In case a rule is matched, this traffic will be matched against 2
subsequent layers
• Enforcing security using an inline layered structure
̶ A rule (called “parent rule”) defers matching to a subsequent layer of
specific rules
̶ Only traffic that matches the “parent rule” will be matched against the
rules of the Inline Layer

Extract of a larger rule base


©2017 Check Point Software Technologies Ltd. [Protected] Distribution or modification is subject to approval ​ 8
Ordered Layers And Inline Layers
Supported Policy Targets
• R77.x gateways support only Ordered Layers
̶ Only one Software Blade can be active per layer
• R80.10 gateways support Ordered and Inline Layers
̶ Ordered Layered policies with one Software Blade active
̶ Ordered Layered policies with multiple Software Blades active
̶ Ordered Layered policies including Inline Layers

Example of an Ordered Layer Policy with


APCL, URLF and Content Awareness Blades active

©2017 Check Point Software Technologies Ltd. [Protected] Distribution or modification is subject to approval ​ 9
Introduction to Content Awareness
File Types, Content Types and Direction used in multiple rules
Direction
• Controlling File Types, Content Types and Direction up-/download/both

Data Type Group


object

Content Type object

• In the above example extract of a larger rule base you see: File Type objects
̶ The download of spreadsheets that contain credit card numbers is allowed
̶ The upload or download of credit card numbers is blocked
̶ The upload of documents and the download of spreadsheets is allowed
• The order of the rules is important as the upper most rule will match first

©2017 Check Point Software Technologies Ltd. [Protected] Distribution or modification is subject to approval ​ 10
Introduction To Content Awareness
Combining File Types and Content Types to a Data Type group object
• When using a Data Type Group object both File
Types and Content Types need to match in order for
the group object to match Data Type Group
object name

• Guideline: you should use Data Type Group objects


when the Content can be limited to specific File
Types File Type (s)
that must match
• Using this group concept improves the efficiency of
the Rule Base
Content Type(s)
that must match
Remember this example!

©2017 Check Point Software Technologies Ltd. [Protected] Distribution or modification is subject to approval ​ 11
Introduction to Content Awareness
Predefined Data Types
• Using the Object Explorer you
can browse the predefined Data
Types
• You can edit properties

Extract of a the list of predefined Data Types

©2017 Check Point Software Technologies Ltd. [Protected] Distribution or modification is subject to approval ​ 12
Content Awareness & DLP – When To Use Which
DLP has more advanced engines and dedicated rule base but works only for HTTP POST, SMTP and FTP
Content Awareness works for all directions and is integrated into the Unified Rule Base. Support of more
advanced engines is on roadmap.

Rule Base Independence Content Awareness DLP

• DLP have a dedicated multi- • Support VSX and IPV6. • Support advanced Data
match rulebase. • Part of unified rulebase
Types, as templates and
• Content Awareness is part with Application Control, fingerprint for data-at-rest.
of the first-match unified URLF and other unified • Have full mail Quarantine
rulebase. rulebase objects. support.
• Content Awareness can also • Scan both incoming and • Has an Exchange Agent to
be used as a dedicated layer outgoing traffic. scan internal Exchange
• Have direction granularity
communication.
in each rule.

©2017 Check Point Software Technologies Ltd. [Protected] Distribution or modification is subject to approval ​ 13
Connections and Sessions
Multiple connections are forming a session

• Connection log message


̶ Contains information related to the TCP connection or UDP pseudo connection
̶ Multiple connections form a session, if they are established within a given time
window
• Session log message
̶ Contains information about the application or content
̶ Is created when APCL, URLF or Content Awareness are enabled
or the track options are configured for “Detailed Log” or “Extended Log”

Session

Connections
©2017 Check Point Software Technologies Ltd. [Protected] Distribution or modification is subject to approval ​ 14
Accessible from
any device

Report customization
©2017 Check Point Software Technologies Ltd. [Protected] Distribution or modification is subject to approval ​ 15
Efficient Operation and
Automation with APIs
Efficiency Cost Savings Agility

Improve Increase Deliver Services


productivity Revenue Faster

R80.10 Automation demo: http://tiny.cc/automationdemo

©2017 Check Point Software Technologies Ltd. [Protected] Distribution or modification is subject to approval ​ 16
Recap Architecture

R80.10 Unified
SmartConsole
Upon Login the userCPM
creates a Session

When the Console


disconnects the Session
history remains

Unified Console is a
true Client, i.e. can’t
operate without the
CPM Server.
Integrated workflow
©2017 Check Point Software Technologies Ltd. [Protected] Distribution or modification is subject to approval ​ 17
Why You Shouldn’t Upgrade (Yet)

• You’re using a Smart-1 5/10/25/205/210


̶ Trade-in hardware for Smart-1 405/410
• Using Endpoint + Network Security Management on same system
̶ Will be addressed post R80.10
• Managing Older End of Life Gateways
̶ Pre-R75.20, UTM-1 EDGE/Safe@
• Using Specific Features (some legacy, some not)
̶ Review sk117237 for complete list
• Using Windows or IPSO Management
̶ Only Gaia supported for R80 and above
©2017 Check Point Software Technologies Ltd. [Restricted] for designated teams ​ 18
The upgrade process
Pre-UpgradeSecurity
Plan The Upgrade Management
Verification Server Upgrade
Security Management Server Upgrade
upgrading with Export/Import
What do I need to know before I start? upgrading with Export/Import
• Assures your system upgrade readiness
̶ Tip! Verify
• Supported Upgrade Pathsin advance, before the actual upgrade
• Use R80
R75.4X, R75.40VS, Upgrade
R76, R77.x,Simulation
R80 Service sk110267
• You can do it yourself
• Operating System #pre_upgrade_verifier
GAIA Run migrate
Run export
migrate import
RHEL (R80.10)
PLAN VERIFY EXPORT IMPORT
• Hardware Requirements # /migrate_tools/migrate
# cd export r77_to_r80.10_export.tgz
$FWDIR/bin/upgrade_tools
For more details, see R80 Release Notes # migrate import /migrate_to_r80/r77_to_r80.10_export.tgz

For any question, contact R80 Desk


Security Management Server Log Server
New HTML format for
High Availability
better readability
SmartEvent Multi Domain Security Management
©2017 Check Point Software Technologies Ltd. [Protected] Distribution or modification is subject to approval ​ 19
Management Servers
supported migrate & upgrade methods table
Type From To: R80.10
SMS R7x.xx • In-place with CPUSE
MDSM • Export/Import (“Advanced”)
1LS 1Indexthe logs by following “Importing Offline Log Files”
2Upgrade the events database following sk110173
2SE

MDSM R7x.xx • Gradual


SMS R80 • In-place with CPUSE
MDSM
LS
SE
SMS - Security Management Server
MDSM - Multi-Domain Security Management
LS – Log Server
SE – SmartEvent

©2017 Check Point Software Technologies Ltd. [Protected] Distribution or modification is subject to approval ​ 20
Hardware Requirements

Supported Smart-1 Appliance Open Server / VM


– Smart-1 50, 150, 225, 405, 410, – Security Management: 2 Cores, 6GB
3050, 3150 RAM
̶ Consider adding more RAM ̶ Recommendation is at least 4 cores and
16GB of RAM, more if available
– Smart-1 25, 205, 210 supported
with limitations – Multi-Domain: 8 Cores, 32GB RAM
̶ Cannot run Management + ̶ The more domains you have, the more
SmartEvent cores and RAM you should have

©2017 Check Point Software Technologies Ltd. [Restricted] for designated teams ​ 21
Migration Tools

• Download appropriate tool based on:


̶ Source Management OS
̶ Target upgrade version

• Links for upgrading to R80.10 from:


̶ Gaia (pre-R80)
̶ SecurePlatform/Linux
̶ Windows
̶ Solaris

©2017 Check Point Software Technologies Ltd. [Restricted] for designated teams ​ 22
MIGRATE EXPORT AND
IMPORT

©2017 Check Point Software Technologies Ltd. [Restricted] for designated teams ​
©2017 Check Point Software Technologies Ltd. [Restricted] for designated teams ​ 24
Migrate Export

©2017 Check Point Software Technologies Ltd. [Restricted] for designated teams ​ 25
Migrate Import

©2017 Check Point Software Technologies Ltd. [Restricted] for designated teams ​ 26
Migrate Import Continues

©2017 Check Point Software Technologies Ltd. [Restricted] for designated teams ​ 27
Migrate Import Still Going…

©2017 Check Point Software Technologies Ltd. [Restricted] for designated teams ​ 28
And… It’s Done!

©2017 Check Point Software Technologies Ltd. [Restricted] for designated teams ​ 29
Remember To Get A New License!

©2017 Check Point Software Technologies Ltd. [Restricted] for designated teams ​ 30
And now…
IT’S UPGRADE TIME!

©2017 Check Point Software Technologies Ltd. [Restricted] for designated teams ​
Verifier

©2017 Check Point Software Technologies Ltd. [Restricted] for designated teams ​ 38
Verifier Result

©2017 Check Point Software Technologies Ltd. [Restricted] for designated teams ​ 39
Verifier: Obsolete Check Point Objects

* Description: Some legacy Check Point network objects are


obsolete in the current Security Management Server version.
These objects are no longer supported.
Please upgrade or remove the following Check Point network
objects before proceeding with an upgrade procedure.
Leaving those unsupported objects in the database may cause
error messages and policy installation problems:
ArrSixFive (Version: NGX R65, Minimal supported version:
R75.20)

©2017 Check Point Software Technologies Ltd. [Restricted] for designated teams ​ 40
Service Name Conflicts with New Default Objects

* Description: Check Point has added 36 protocols and 33


services to the default database. A number of these new
default objects conflict with existing user objects.
To resolve the issue, rename these objects:
Services:
RDP
snmp-trap
Comment: if you choose to leave objects as is, during
upgrade process "_" will be added as suffix to each object
name which conflicts default database.

©2017 Check Point Software Technologies Ltd. [Restricted] for designated teams ​ 41
IPS Protections by Type Changes in R80

* Description: Deactivating IPS protections by type


(Client/Server) will be supported for pre R80 gateways
only.
When deactivating Client or Server protections, it will not
be supported for R80.10 gateway.
We recommend you to move to the new tag based activation
for Client/Server protections.

Profiles name:
HomeProfile

©2017 Check Point Software Technologies Ltd. [Restricted] for designated teams ​ 42
Deprecated Application Control Categories in R80
* Description: Rulebase contains Application Control categories or group
of categories that were deprecated.
For deprecated categories list and recommended substitutes please refer
to sk106783.
The following categories are deprecated:

The category: "Google Talk protocol" in rule Num. 5 of "AnimalPolicy"


policy is deprecated
The category: "Oscar protocol" in rule Num. 9 of "AnimalPolicy" policy
is deprecated
The category: "Torrent Trackers" in rule Num. 9 of "AnimalPolicy" policy
is deprecated, it will be replaced with "P2P File Sharing"

©2017 Check Point Software Technologies Ltd. [Restricted] for designated teams ​ 43
Threat Prevention Permission Profiles

* Description: As part of IPS integration into Threat Prevention in


R80, IPS permissions will be unified with Threat Prevention
permissions.
To resolve permissions conflicts between IPS and Threat Prevention,
during upgrade the more strict permission will be applied.

Conflicts were found in the following permission profiles :


Endpoint_Full_Access,
Endpoint_Helpdesk,
testprofile,
test2profile

©2017 Check Point Software Technologies Ltd. [Restricted] for designated teams ​ 44
LTE Services

* Description: Database contains LTE services that are not


yet supported in R80.10
These LTE services will be deleted during the upgrade to
R80.10:

Unsupported LTE services are:


gtp_v2_default
gtp_mm_v2_default
gtp_additional_v2_default

©2017 Check Point Software Technologies Ltd. [Restricted] for designated teams ​ 45
THE FINISHED PRODUCT

©2017 Check Point Software Technologies Ltd. [Restricted] for designated teams ​
Firewall Policy Layer

©2017 Check Point Software Technologies Ltd. [Restricted] for designated teams ​ 50
©2017 Check Point Software Technologies Ltd. [Restricted] for designated teams ​ 51
©2017 Check Point Software Technologies Ltd. [Restricted] for designated teams ​ 52
©2017 Check Point Software Technologies Ltd. [Restricted] for designated teams ​ 53
THANK YOU

©2017 Check Point


©2017 Software
Check Point Technologies Ltd.
Software Technologies Ltd. [Restricted] for designated teams ​ 54

Вам также может понравиться