Page 1
Check Point UTM-1 Edge Internet Security Appliance User Guide Version 7.5 Part No: 700800, August 2007...
Page 2
Check Point, AlertAdvisor, Application Intelligence, Check Point When we speak of free software, we are referring to freedom, not Express, Check Point Express CI, the Check Point logo, Check Point price. Our General Public Licenses are designed to make sure that you...
Page 3
1. You may copy and distribute verbatim copies of the Program's distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate b) Accompany it with a written offer, valid for at least copyright notice and disclaimer of warranty;...
Page 4
Do not use any accessories other than those approved by 10. If you wish to incorporate parts of the Program into other free Check Point. Failure to do so may result in loss of programs whose distribution conditions are different, write to the performance, damage to the product, fire, electric shock or author to ask for permission.
Page 5
POWER ADAPTER Operate this product only from the type of power source indicated on the product’s marking label. If you are not sure of the type of power supplied to your home, consult your dealer or local power company. Use only the power supply provided with your product. Check whether the device’s set supply voltage is the same as the local supply voltage.
Contents Contents About This Guide ..........................vii Introduction............................1 About Your Check Point UTM-1 Embedded NGX Appliance............1 The UTM-1 Edge X Series and UTM-1 Edge W Series ..............2 Contacting Technical Support......................38 UTM-1 Security...........................39 Introduction to Information Security....................39 The UTM-1 Firewall.........................44 Installing and Setting Up UTM-1 ......................53 Before You Install the UTM-1 Appliance..................53...
Page 8
Configuring High Availability on a Gateway .................246 Sample Implementation on Two Gateways..................250 Using Traffic Shaper.........................255 Overview............................255 Setting Up Traffic Shaper .......................256 Predefined QoS Classes ........................257 Adding and Editing Classes ......................259 Viewing and Deleting Classes......................263 Check Point UTM-1 Edge User Guide...
Page 9
Contents Restoring Traffic Shaper Defaults....................264 Working with Wireless Networks....................265 Overview............................265 Configuring Wireless Networks......................273 Troubleshooting Wireless Connectivity..................302 Viewing Reports ..........................305 Viewing the Event Log ........................305 Using the Traffic Monitor .......................308 Viewing Computers ........................312 Viewing Connections ........................314 Viewing Wireless Statistics......................316 Viewing ADSL Statistics ........................320 Viewing the Routing Table ......................322 Setting Your Security Policy ......................325 The UTM-1 Firewall Security Policy....................326...
Page 10
Viewing and Deleting VPN Sites....................523 Enabling/Disabling a VPN Site.......................523 Logging on to a Remote Access VPN Site..................524 Logging off a Remote Access VPN Site ..................527 Installing a Certificate ........................528 Uninstalling a Certificate ........................536 Viewing VPN Tunnels ........................537 Check Point UTM-1 Edge User Guide...
Page 11
Contents Viewing IKE Traces for VPN Connections ..................540 Viewing VPN Topology .........................541 Managing Users..........................543 Changing Your Login Credentials ....................543 Adding and Editing Users .......................546 Adding Quick Guest HotSpot Users ....................550 Viewing and Deleting Users ......................552 Setting Up Remote VPN Access for Users ..................553 Using RADIUS Authentication.......................553 Configuring RADIUS Attributes ....................560 Using Remote Desktop........................565...
Page 12
Troubleshooting ..........................653 Connectivity ............................653 Service Center and Upgrades ......................657 Other Problems ..........................658 Specifications .............................659 Technical Specifications .........................659 CE Declaration of Conformity ......................667 Federal Communications Commission Radio Frequency Interference Statement ......674 Glossary of Terms ..........................677 Index..............................683 Check Point UTM-1 Edge User Guide...
If this icon appears... You can perform the task using these products... All UTM-1 Edge X products, including UTM-1 Edge X Industrial All UTM-1 Edge W products Only UTM-1 products with USB ports Only UTM-1 products with ADSL...
This chapter introduces the Check Point UTM-1 appliance and this guide. This chapter includes the following topics: About Your Check Point UTM-1 Embedded NGX Appliance ....1 The UTM-1 Edge X Series and UTM-1 Edge W Series ......2 Contacting Technical Support ..............38 About Your Check Point UTM-1 Embedded NGX...
The UTM-1 Edge X Series and UTM-1 Edge W Series UTM-1 Edge X and UTM-1 Edge W Series Products The UTM-1 Edge X and Edge W product families include various hardware series and models, as described in the following tables. You can upgrade your UTM-1 Edge appliance to a more advanced model within its hardware series, without replacing the hardware.
Page 17
The UTM-1 Edge X Series and UTM-1 Edge W Series Table 2: UTM-1 Edge W Products Hardware Series Models UTM-1 Edge W UTM-1 Edge W8 UTM-1 Edge W16 UTM-1 Edge W32 UTM-1 Edge WU UTM-1 Edge W ADSL UTM-1 Edge W8 ADSL...
Page 18
The UTM-1 Edge X Series and UTM-1 Edge W Series Concurrent Firewall 8,000 Connections Hardware Features 4-Port LAN Switch 10/100 Mbps WAN Port Ethernet, 10/100 Ethernet, 10/100 ADSL2+ Mbps Mbps ADSL Standards — — ADSL2, ADSL2+, T.1413 G.DMT (G.992.1) G.Lite (G.992.2)
Page 19
The UTM-1 Edge X Series and UTM-1 Edge W Series Firewall & Security Features Check Point Stateful Inspection Firewall Application Intelligence SmartDefense™ (IPS) Network Address Translation (NAT) Four Preset Security Policies Anti-spoofing Voice over IP (H.323) Support Unlimited INSPECT Policy...
Page 20
The UTM-1 Edge X Series and UTM-1 Edge W Series Secure HotSpot (Guest Access) Remote Access Users 1/10/15/25 VPN Server with SecuRemote, L2TP OfficeMode and RADIUS Support Site-to-Site VPN Gateway Route-based VPN Backup VPN Gateways Remote Access VPN SecuRemote (Included)
Page 21
The UTM-1 Edge X Series and UTM-1 Edge W Series Spanning Tree Protocol (STP) Traffic Shaper (QoS) Traffic Monitoring Dead Internet Connection Detection (DCD) WAN Load Balancing Backup Internet Connection DHCP Server, Client, and Relay MAC Cloning Network Address Translation (NAT) Rules...
Page 22
The UTM-1 Edge X Series and UTM-1 Edge W Series Management Central Management Check Point SmartCenter, Check Point SmartLSM, Check Point SmartUpdate, CheckPoint Provider-1, SofaWare SMP Local Management HTTP / HTTPS / SSH / SNMP / Serial CLI Remote Desktop...
Page 23
The UTM-1 Edge X Series and UTM-1 Edge W Series UTM-1 Edge W Series Features Table 4: UTM-1 Edge W Series Features Feature UTM-1 Edge W UTM-1 Edge W ADSL SKU Prefix CPUTM-EDGE-WG CPUTM-EDGE-WG-n- ADSL Concurrent Users 8 / 16 / 32 / Unrestricted...
Page 24
The UTM-1 Edge X Series and UTM-1 Edge W Series Dialup Backup (Req. Ext. Modem) Console Port (Serial) Print Server USB 2.0 Ports Firewall & Security Features Check Point Stateful Inspection Firewall Application Intelligence (IPS) Intrusion Detection and Prevention using Check Point...
Page 25
The UTM-1 Edge X Series and UTM-1 Edge W Series Port-based, Tag-based, and 32 (WU) / 10 (Other Models) Other VLAN Port-based Security (802.1x) Web Rules Secure HotSpot (Guest Access) Remote Access Users 1/10/15/25 VPN Server with OfficeMode and SecuRemote, L2TP...
Page 26
The UTM-1 Edge X Series and UTM-1 Edge W Series Networking Supported Internet Connection Static IP, DHCP, PPPoE, Static IP, DHCP, PPPoE, Methods PPTP, Telstra, Cable, Dialup PPTP, Telstra, Cable, Dialup, EoA, PPPoA Transparent Bridge Mode Spanning Tree Protocol (STP)
Page 27
The UTM-1 Edge X Series and UTM-1 Edge W Series Dynamic Routing Wireless Wireless Protocols 802.11b (11 Mbps), 802.11g (54 Mbps), Super G* (108 Mbps) Wireless Security VPN over Wireless, WEP, WPA2 (802.11i), WPA- Personal, WPA-Enterprise, 802.1x Wireless QoS (WMM)
Page 28
The UTM-1 Edge X Series and UTM-1 Edge W Series NTP Automatic Time Setting TFTP Rapid Deployment Hardware Specifications Power 100/110/120/210/220/230VAC (Linear Power Adapter) or 100~240VAC (Switched Power Adapter) Mounting Options Desktop, Wall, or Rack Mounting** Warranty 1 Year Hardware * Super G and XR mode are only available with select wireless network adapters.
Page 29
The UTM-1 Edge X Series and UTM-1 Edge W Series Software Requirements One of the following browsers: • Microsoft Internet Explorer 6.0 or higher • Netscape Navigator 6.0 and higher • Mozilla Firefox Note: For proper operation of the UTM-1 Portal, disable any pop-up blockers for http://my.firewall.
Page 30
All physical connections (network and power) are made via the rear panel of your UTM-1 appliance. Figure 1: UTM-1 Edge X Appliance Rear Panel The following table lists the UTM-1 Edge X appliance's rear panel elements. Table 5: UTM-1 Edge X Appliance Rear Panel Elements Label Description A power jack used for supplying power to the unit.
Page 31
The UTM-1 Edge X Series and UTM-1 Edge W Series Label Description RESET A button used for rebooting the UTM-1 appliance or resetting the UTM-1 appliance to its factory defaults. You need to use a pointed object to press this button.
Page 32
The UTM-1 Edge X Series and UTM-1 Edge W Series Front Panel The UTM-1 Edge X appliance includes several status LEDs that enable you to monitor the appliance’s operation. Figure 2: UTM-1 Edge X Appliance Front Panel For an explanation of the UTM-1 Edge X appliance’s status LEDs, see the table below.
Page 33
Especially designed for industrial use, the UTM-1 Edge X Industrial appliance brings the proven security benefits of the UTM-1 Edge X appliance to the production floor, protecting machines against all threats.
Page 34
• A dialup modem with a USB or serial interface Rear Panel Figure 3: UTM-1 Edge X Industrial Appliance Rear Panel The following table lists the UTM-1 Edge X Industrial appliance's rear panel elements. Check Point UTM-1 Edge User Guide...
Page 35
UTM-1 Edge X Industrial Appliance on a DIN Rail on page 74. Front Panel The UTM-1 Edge X Industrial appliance's front panel includes ports for network and power connections, as well as status LEDs that enable you to monitor the appliance’s operation.
Page 36
UTM-1 CLI (Command Line Interface), or for connecting an external dialup modem. Two USB 2.0 ports used for connecting USB-based printers or modems Status For an explanation of the UTM-1 Edge X Industrial appliance’s status LEDs, see LEDs the following table. RESET A button used for rebooting the UTM-1 appliance or resetting the UTM-1 appliance to its factory defaults.
Page 37
The UTM-1 Edge X Series and UTM-1 Edge W Series Table 9: UTM-1 Edge X Appliance Status LEDs State Explanation No VPN activity Flashing (Green) VPN activity On (Green) VPN tunnels established, no activity Serial No Serial port activity Flashing (Green)
Page 38
The UTM-1 Edge X Series and UTM-1 Edge W Series Getting to Know Your UTM-1 Edge X ADSL Appliance Package Contents The UTM-1 Edge X ADSL package includes the following: • UTM-1 Edge X ADSL Internet Security Appliance • Power supply •...
Page 39
All physical connections (network and power) are made via the rear panel of your UTM-1 appliance. Figure 5: UTM-1 Edge X ADSL Appliance Rear Panel The following table lists the UTM-1 Edge X ADSL appliance's rear panel elements. Table 10: UTM-1 Edge X ADSL Appliance Rear Panel Elements Label Description A power jack used for supplying power to the unit.
Page 40
The UTM-1 Edge X Series and UTM-1 Edge W Series Label Description Serial An RJ-45 serial (RS-232) port used for connecting computers in order to access the UTM-1 CLI (Command Line Interface), or for connecting an external dialup modem. An RJ-45 to DB9 converter is supplied for your convenience.
Page 41
The UTM-1 Edge X Series and UTM-1 Edge W Series Front Panel The UTM-1 Edge X ADSL appliance includes several status LEDs that enable you to monitor the appliance’s operation. Figure 6: UTM-1 Edge X ADSL Appliance Front Panel For an explanation of the UTM-1 Edge X ADSL appliance’s status LEDs, see the following table.
Page 42
The UTM-1 Edge X Series and UTM-1 Edge W Series State Explanation LNK/ACT Flashing Data is being transmitted/received Link Off Link is down Link Flashing Establishing ADSL connection Link On ADSL connection established DAT Off ADSL line is idle DAT Flashing...
Page 43
The UTM-1 Edge X Series and UTM-1 Edge W Series Getting to Know Your UTM-1 Edge W Appliance Package Contents The UTM-1 Edge W package includes the following: • UTM-1 Edge W Internet Security Appliance • Power supply • CAT5 Straight-through Ethernet cable •...
Page 44
All physical connections (network and power) are made via the rear panel of your UTM-1 appliance. Figure 7: UTM-1 Edge W SBXW-166LHGE-5 Appliance Rear Panel Figure 8: UTM-1 Edge W SBXW-166LHGE-6 Appliance Rear Panel The following table lists the UTM-1 Edge W appliance's rear panel elements. Check Point UTM-1 Edge User Guide...
Page 45
The UTM-1 Edge X Series and UTM-1 Edge W Series Table 12: UTM-1 Edge W Appliance Rear Panel Elements Label Description A power jack used for supplying power to the unit. Connect the supplied power supply to this jack. RESET A button used for rebooting the UTM-1 appliance or resetting the UTM-1 appliance to its factory defaults.
Page 46
Antenna connectors, used to connect the supplied wireless antennas . ANT 2 Front Panel The UTM-1 Edge W appliance includes several status LEDs that enable you to monitor the appliance’s operation. Figure 9: UTM-1 Edge W Appliance Front Panel For an explanation of the UTM-1 Edge W appliance’s status LEDs, see the table below.
Page 47
The UTM-1 Edge X Series and UTM-1 Edge W Series State Explanation On (Green) Normal operation On (Red) Error Flashing (Orange) Software update in progress LINK/ACT Off, 100 Off LAN 1-4/ Link is down WAN/ DMZ/WAN2 LINK/ACT On, 100 Off...
Page 48
The UTM-1 Edge X Series and UTM-1 Edge W Series Getting to Know Your UTM-1 Edge W ADSL Appliance Package Contents The UTM-1 Edge W ADSL package includes the following: • UTM-1 Edge W ADSL Internet Security Appliance • Power supply •...
Page 49
All physical connections (network and power) are made via the rear panel of your UTM-1 appliance. Figure 10: UTM-1 Edge W ADSL Appliance Rear Panel The following table lists the UTM-1 Edge W ADSL appliance's rear panel elements. Table 14: UTM-1 Edge W ADSL Appliance Rear Panel Elements Label Description A power jack used for supplying power to the unit.
Page 50
The UTM-1 Edge X Series and UTM-1 Edge W Series Label Description Two USB 2.0 ports used for connecting USB-based printers or modems Serial An RJ-45 serial (RS-232) port used for connecting computers in order to access the UTM-1 CLI (Command Line Interface), or for connecting an external dialup modem.
Page 51
The UTM-1 Edge X Series and UTM-1 Edge W Series Front Panel The UTM-1 Edge W ADSL appliance includes several status LEDs that enable you to monitor the appliance’s operation. Figure 11: UTM-1 Edge W ADSL Appliance Front Panel For an explanation of the UTM-1 Edge W ADSL appliance’s status LEDs, see the following table.
Flashing (Green) WLAN activity Contacting Technical Support If there is a problem with your UTM-1 appliance, see http://www.checkpoint.com/techsupport/. You can also download the latest version of this guide from the Check Point SecureKnowledge Web site. Check Point UTM-1 Edge User Guide...
Introduction to Information Security Chapter 2 UTM-1 Security This chapter explains the basic security concepts on which UTM-1 security is based. This chapter includes the following topics: Introduction to Information Security ............39 The UTM-1 Firewall ..................44 Introduction to Information Security Network security is but a small part of information security, which in turn is only a fraction of general security.
Page 54
Local laws may also enforce the security requirements made in the Health Insurance Portability and Accountability Act of 1996 (HIPAA). • To comply with another organization's security requirements Some organizations require their business partners to comply with international standards of security. Check Point UTM-1 Edge User Guide...
Page 55
Introduction to Information Security Information Security Challenges The challenges of information security can be divided into the following areas: • Confidentiality and Privacy - Ensuring that only the intended recipients can read certain information • Authentication - Ensuring that information is actually sent by the stated sender •...
Page 56
For example: • Nowadays, most of an organization's communication and business transactions are conducted via email (regardless of the organization's size). • Online stores process orders and supply products over the Internet. Check Point UTM-1 Edge User Guide...
Page 57
Introduction to Information Security • Emerging technology today allows an organization's branch offices to communicate, share data, and even establish low-cost VoIP (Voice over IP) communications, rather then using the traditional phone system. • Applications are hosted on a main computer rather than on personal workstations.
For example, a previously authenticated user would be allowed access through the firewall for authorized services only. • Information manipulation - The ability to perform logical or arithmetic functions on data in any part of the packet. For example, the ability to encrypt packets. Check Point UTM-1 Edge User Guide...
Page 59
Older firewall technologies, such as packet filtering and application-layer gateways, are still in use in some environments. It is important to familiarize yourself with these technologies, so as to better understand the benefits and advantages of the Check Point Stateful Inspection firewall technology.
Page 60
Poor scalability (breaks the client/server model) Check Point Stateful Inspection Technology Invented by Check Point, Stateful Inspection is the industry standard for network security solutions. A powerful inspection module examines every packet, ensuring that packets do not enter a network unless they comply with the network's security policy.
Page 61
The UTM-1 Firewall Packet State and Context Information To track and act on both state and context information for an application is to treat that traffic statefully. The following are examples of state and context-related information that a firewall should track and analyze: •...
Page 62
FTP client with data port server information P > 1023 Data Client initiates data D > FTP server connection to client 1023 server on port P Data Server FTP client acknowledges server data connection Check Point UTM-1 Edge User Guide...
Page 63
The UTM-1 Firewall The following diagram demonstrates the establishment of a Passive FTP connection through a firewall protecting the FTP server. Figure 12: Establishment of Passive FTP Connection From the FTP server's perspective, the following connections are established: • Command connection from the client on a port greater than 1023, to the server on port 21 •...
Page 64
HTTP proxy for HTTP session, and so on), and since the application-layer gateway can only support a certain number of proxies, its usefulness and scalability is limited. Finally, this approach exposes the operating system to external threats. Check Point UTM-1 Edge User Guide...
Page 65
The UTM-1 Firewall Firewall Technology Action Stateful Inspection A Stateful Inspection firewall examines the FTP application-layer Firewall data in an FTP session. When the client initiates a command session, the firewall extracts the port number from the request. The firewall then records both the client and server's IP addresses and port numbers in an FTP-data pending request list.
This chapter includes the following topics: Before You Install the UTM-1 Appliance ..........53 UTM-1 Edge X and UTM-1 Edge W Installation ........67 Cascading Your Appliance.................82 Connecting the Appliance to Network Printers ..........83 Setting Up the UTM-1 Appliance ..............83...
Page 68
Before You Install the UTM-1 Appliance Windows Vista Checking the TCP/IP Installation Click Start > Control Panel. The Control Panel window appears. Under Network and Internet, click View network status and tasks. Check Point UTM-1 Edge User Guide...
Page 69
Before You Install the UTM-1 Appliance The Network Sharing Center screen appears. In the Tasks pane, click Manage network connections. Chapter 3: Installing and Setting Up UTM-1...
Page 70
Before You Install the UTM-1 Appliance The Network Connections screen appears. Double-click the Local Area Connection icon. The Local Area Connection Status window opens. Click Properties. Check Point UTM-1 Edge User Guide...
Page 71
Before You Install the UTM-1 Appliance The Local Area Connection Properties window opens. Check if Internet Protocol Version 4 (TCP/IPv4) appears in the list box and if it is properly configured with the Ethernet card installed on your computer. TCP/IP Settings In the Local Area Connection Properties window, double-click the Internet Protocol Version 4 (TCP/IPv4) component, or select it and click Properties.
Page 72
Click OK to save the new settings. Your computer is now ready to access your UTM-1 appliance. Windows 2000/XP Checking the TCP/IP Installation Click Start > Settings > Control Panel. The Control Panel window appears. Check Point UTM-1 Edge User Guide...
Page 73
Before You Install the UTM-1 Appliance Double-click the Network and Dial-up Connections icon. The Network and Dial-up Connections window appears. icon and select Properties from the pop-up menu that Right-click the opens. Chapter 3: Installing and Setting Up UTM-1...
Page 74
In the above window, check if TCP/IP appears in the components list and if it is properly configured with the Ethernet card installed on your computer. If TCP/IP does not appear in the Components list, you must install it as described in the next section. Check Point UTM-1 Edge User Guide...
Page 75
Before You Install the UTM-1 Appliance Installing TCP/IP Protocol In the Local Area Connection Properties window click Install. The Select Network Component Type window appears. Select Protocol and click Add. The Select Network Protocol window appears. Choose Internet Protocol (TCP/IP) and click OK. TCP/IP protocol is installed on your computer.
Page 76
(Note that 192.168.10 is the default value, and it may vary if you changed it in the Network > My Network page.) Click the Obtain DNS server address automatically radio button. Click OK to save the new settings. Your computer is now ready to access your UTM-1 appliance. Check Point UTM-1 Edge User Guide...
Page 77
Before You Install the UTM-1 Appliance Mac OS Use the following procedure for setting up the TCP/IP Protocol. Choose Apple Menus -> Control Panels -> TCP/IP. The TCP/IP window appears. Click the Connect via drop-down list, and select Ethernet. Click the Configure drop-down list, and select Using DHCP Server. Close the window and save the setup.
Page 78
Before You Install the UTM-1 Appliance Mac OS-X Use the following procedure for setting up the TCP/IP Protocol. Choose Apple -> System Preferences. The System Preferences window appears. Click Network. The Network window appears. Check Point UTM-1 Edge User Guide...
Page 79
Before You Install the UTM-1 Appliance Click Configure. Chapter 3: Installing and Setting Up UTM-1...
Page 80
Before You Install the UTM-1 Appliance TCP/IP configuration fields appear. Click the Configure IPv4 drop-down list, and select Using DHCP. Click Apply Now. Check Point UTM-1 Edge User Guide...
UTM-1 Edge X and UTM-1 Edge W Installation UTM-1 Edge X and UTM-1 Edge W Installation Installing UTM-1 Edge X and Edge W To install the UTM-1 appliance Verify that you have the correct cable type. For information, see Network Requirements on page 30.
Page 82
UTM-1 Edge X and UTM-1 Edge W Installation Figure 13: Typical Connection Diagram Installing UTM-1 Edge X Industrial To install the UTM-1 appliance Verify that you have the correct cable type. For information, see Network Requirements on page 30. Connect the LAN cable: Connect one end of the Ethernet cable to one of the appliance's LAN ports.
Page 83
UTM-1 Edge X and UTM-1 Edge W Installation Do one of the following: • To use 24V DC input power, see Connecting a 24V Power Supply on page You will need a 24V DC industrial power supply. • To use 5V DC input power: 1) Connect the 5V power supply provided with the UTM-1 appliance to the 5V power socket at the back of the unit.
Page 84
UTM-1 Edge X and UTM-1 Edge W Installation Connecting a 24V Power Supply Warning: Always turn off the 24V DC industrial power supply before wiring, installing, or removing the UTM-1 Edge X Industrial appliance. Failure to do so may cause faulty operation. To connect 24V power supply Turn off the 24V DC industrial power supply.
Page 85
UTM-1 Edge X and UTM-1 Edge W Installation Insert the Black (-) wire in the right terminal. Insert the Brown (+) wire in the left terminal. Firmly tighten the plug's screw. Warning: Failure to tighten the DC connector plug's screw sufficiently may result in a fire.
Page 86
Turn on the 24V DC industrial power supply. Check that the appliance is operating correctly. Installing UTM-1 Edge X ADSL and Edge W ADSL To install the UTM-1 appliance Verify that you have the correct cable type. For information, see Network Requirements on page 30.
Page 87
UTM-1 Edge X and UTM-1 Edge W Installation Connect the power supply to the appliance's power socket, labeled PWR. Plug the power supply into the wall electrical outlet. Warning: The UTM-1 appliance power supply is compatible with either 100, 120 or 230 VAC input power.
Page 88
Mounting the UTM-1 Edge X Industrial Appliance on a DIN Rail For your convenience, the UTM-1 Edge X Industrial appliance includes a DIN rail mounting bracket, which enables you to mount your appliance in any DIN Rail cabinet or enclosure:...
Page 89
UTM-1 Edge X and UTM-1 Edge W Installation You can mount the appliance facing up, down, or outwards. The appliance includes slots and holes on both side panels and on its rear panel, for this purpose: To mount the UTM-1 appliance on a DIN rail Decide on the mounting orientation.
Page 90
UTM-1 Edge X and UTM-1 Edge W Installation Note: To locate the appliance's right and left side panels, hold the appliance with its front panel facing away from you. The side panel on your left is the appliance left side panel, and the side panel on your right is the appliance's right side panel.
Page 91
Preparing the Edge Appliance for a Wireless Connection To prepare the UTM-1 Edge W appliance for a wireless connection Connect the antennas that came with your UTM-1 Edge W appliance to the ANT1 and ANT2 antenna connectors in the appliance's rear panel.
Page 92
UTM-1 Edge X and UTM-1 Edge W Installation Wall Mounting the UTM-1 Edge Appliance For your convenience, the UTM-1 Edge appliance includes a wall mounting kit, which consists of two plastic conical anchors and two cross-head screws. To mount the UTM-1 appliance Edge on the wall Decide where you want to mount your UTM-1 Edge appliance.
Page 93
If you want to mount the appliance on a plaster wall, you must use anchors that are suitable for plaster walls. Insert the two screws you received with your UTM-1 Edge appliance into the plastic conical anchors, and turn them until they protrude approximately 5 mm from the wall.
Page 94
Securing the UTM-1 Edge Appliance against Theft The UTM-1 Edge appliance features a security slot to the rear of the right panel, which enables you to secure your appliance against theft, using an anti-theft security device. Note: Anti-theft security devices are available at most computer hardware stores.
Page 95
Slide the anti-theft device's bolt to the Open position. Insert the bolt into the UTM-1 Edge appliance's security slot, then slide the bolt to the Closed position until the bolts holes are aligned.
The UTM-1 appliance automatically detects cable types, so you can use either a straight-through or crossed Ethernet cable. Connect the other end of the cable to an Ethernet hub or switch. Connect additional computers and network devices to the hub or switch as desired. Check Point UTM-1 Edge User Guide...
Connecting the Appliance to Network Printers Connecting the Appliance to Network Printers In models with a print server, you can connect network printers. To connect network printers Connect one end of a USB cable to one of the appliance's USB ports. If needed, you can use the provided USB extension cord.
Page 98
Connecting to a Service Center on page 446 You can access the Setup Wizard at any time after initial setup, using the procedure below. To access the Setup Wizard Click Setup in the main menu, and click the Firmware tab. Check Point UTM-1 Edge User Guide...
Page 99
Setting Up the UTM-1 Appliance The Firmware page appears. Click UTM-1 Setup Wizard. The UTM-1 Setup Wizard opens with the Welcome page displayed. Chapter 3: Installing and Setting Up UTM-1...
Initial Login to the UTM-1 Portal Chapter 4 Getting Started This chapter contains all the information you need in order to get started using your UTM- 1 appliance. This chapter includes the following topics: Initial Login to the UTM-1 Portal ..............87 Logging on to the UTM-1 Portal..............89 Accessing the UTM-1 Portal Remotely Using HTTPS ......91 Using the UTM-1 Portal................92...
Internet Wizard, see Using the Internet Wizard on page 98. After you have completed the Internet Wizard, the Setup Wizard continues to guide you through appliance setup. For more information, see Setting Up the UTM-1 Appliance on page 83. Check Point UTM-1 Edge User Guide...
Logging on to the UTM-1 Portal • Internet Setup Internet Setup offers advanced setup options, such as configuring two Internet connections. To use Internet Setup, click Cancel and refer to Using Internet Setup on page 113. Logging on to the UTM-1 Portal Note: By default, HTTP and HTTPS access to the UTM-1 Portal is not allowed from the WLAN, unless you do one of the following: •...
Page 104
Logging on to the UTM-1 Portal The login page appears. Type your username and password. Click OK. The Welcome page appears. Check Point UTM-1 Edge User Guide...
Accessing the UTM-1 Portal Remotely Using HTTPS Accessing the UTM-1 Portal Remotely Using HTTPS You can access the UTM-1 Portal remotely (from the Internet) through HTTPS. HTTPS is a protocol for accessing a secure Web server. It is used to transfer confidential user information.
Used for navigating between the various topics (such as Reports, Security, and Setup). Main frame Displays information and controls related to the selected topic. The main frame may also contain tabs that allow you to view different pages related to the selected topic. Check Point UTM-1 Edge User Guide...
Page 107
Using the UTM-1 Portal Element Description Status bar Shows your Internet connection and managed services status. Figure 19: UTM-1 Portal Chapter 4: Getting Started...
Page 108
UTM-1 appliance. Users Allows you to manage UTM-1 appliance users. Allows you to manage, configure, and log on to VPN sites. Help Provides context-sensitive help. Logout Allows you to log off of the UTM-1 Portal. Check Point UTM-1 Edge User Guide...
Page 109
Using the UTM-1 Portal Main Frame The main frame displays the relevant data and controls pertaining to the menu and tab you select. These elements sometimes differ depending on what model you are using. The differences are described throughout this guide. Status Bar The status bar is located at the bottom of each page.
If you are connected through HTTP, click Logout in the main menu. The Login page appears. • If you are connected through HTTPS, the Logout option does not appear in the main menu. Close the browser window. Check Point UTM-1 Edge User Guide...
Overview Chapter 5 Configuring the Internet Connection This chapter describes how to configure and work with a UTM-1 Internet connection. This chapter includes the following topics: Overview ....................97 Using the Internet Wizard ................98 Using Internet Setup .................113 Setting Up Dialup Modems ..............145 Viewing Internet Connection Information..........152 Enabling/Disabling the Internet Connection..........154 Using Quick Internet Connection/Disconnection ........155...
Note: The first time you log on to the UTM-1 Portal, the Internet Wizard starts automatically as part of the Setup Wizard. In this case, you should skip to step 3 in the following procedure. Check Point UTM-1 Edge User Guide...
Page 113
Using the Internet Wizard Configuring an Ethernet-Based Connection on Non- ADSL Models To configure an Ethernet-Based connection Click Network in the main menu, and click the Internet tab. The Internet page appears. Click Internet Wizard. The Internet Wizard opens with the Welcome page displayed. Click Next.
Page 114
If you chose Cable Modem, continue at Using a Cable Modem Connection on page 104. If you chose Static IP, continue at Using a Static IP Connection on page 105. If you chose DHCP, continue at Using a DHCP Connection on page 106. Check Point UTM-1 Edge User Guide...
Page 115
Using the Internet Wizard Using a PPPoE Connection If you selected the PPPoE (PPP over Ethernet) connection method, the PPP Configuration dialog box appears. Complete the fields using the information in the following table. Click Next. Chapter 5: Configuring the Internet Connection...
Page 116
Using the Internet Wizard The Confirmation screen appears. Click Next. The system attempts to connect to the Internet via the specified connection. The Connecting… screen appears. At the end of the connection process the Connected screen appears. Check Point UTM-1 Edge User Guide...
Page 117
Using the Internet Wizard Click Finish. Table 23: PPPoE Connection Fields In this field… Do this… Username Type your user name. Password Type your password. Confirm password Type your password again. Service Type your service name. This field can be left blank. Using a PPTP Connection If you selected the PPTP connection method, the PPP Configuration dialog box appears.
Page 118
No further settings are required for a cable modem connection. The Confirmation screen appears. Click Next. The system attempts to connect to the Internet via the specified connection. The Connecting… screen appears. At the end of the connection process the Connected screen appears. Click Finish. Check Point UTM-1 Edge User Guide...
Page 119
Using the Internet Wizard Using a Static IP Connection If you selected the Static IP connection method, the Static IP Configuration dialog box appears. Complete the fields using the information in the following table. Click Next. The Confirmation screen appears. Click Next.
Page 120
No further settings are required for a DHCP (Dynamic IP) connection. The Confirmation screen appears. Click Next. The system attempts to connect to the Internet via the specified connection. The Connecting… screen appears. At the end of the connection process the Connected screen appears. Click Finish. Check Point UTM-1 Edge User Guide...
Page 121
Using the Internet Wizard Configuring an Ethernet-Based Connection on ADSL Models Note: In ADSL models, an Ethernet-based connection is made on the DMZ/WAN2 port. To configure an Ethernet-based connection Click Network in the main menu, and click the Internet tab. The Internet page appears.
Page 122
If you chose Cable Modem, continue at Using a Cable Modem Connection on page 104. If you chose Static IP, continue at Using a Static IP Connection on page 105. If you chose DHCP, continue at Using a DHCP Connection on page 106. Check Point UTM-1 Edge User Guide...
Page 123
Using the Internet Wizard Configuring a Direct ADSL Connection To configure a direct ADSL connection Click Network in the main menu, and click the Internet tab. The Internet page appears. Click Internet Wizard. The Internet Wizard opens with the Welcome page displayed. Click Next.
Page 124
ISP. • To manually fill in the supported ADSL settings for your ISP, complete the fields using the information in the following table. Click Next. The Internet Connection Method dialog box appears. Check Point UTM-1 Edge User Guide...
Page 125
Using the Internet Wizard Select the Internet connection method you want to use for connecting to the Internet. Click Next. If you chose PPPoE or PPPoA, continue at Using a PPPoE or PPPoA Connection on page 112. If you chose Static IP, continue at Using a Static IP Connection on page 105. If you chose DHCP, continue at Using a DHCP Connection on page 106.
Page 126
The Confirmation screen appears. Click Next. The system attempts to connect to the Internet via the specified connection. The Connecting… screen appears. At the end of the connection process the Connected screen appears. Click Finish. Check Point UTM-1 Edge User Guide...
Using Internet Setup Table 27: PPPoE Connection Fields In this field… Do this… Username Type your user name. Password Type your password. Confirm password Type your password again. Using Internet Setup Internet Setup allows you to manually configure your Internet connection. For information on configuring bridged Internet connections, see Adding Internet Connections to Bridges on page 237.
Page 128
Using Internet Setup The Internet page appears. Next to the desired Internet connection, click Edit. Check Point UTM-1 Edge User Guide...
Page 129
Using Internet Setup The Internet Setup page appears. Do one of the following: • To configure an ADSL connection using the internal ADSL modem, continue at Configuring a Direct ADSL Connection on page 116. This option is available in ADSL models only. •...
Page 130
For EoA, continue at Using an EoA Connection on page 119. For PPPoE, continue at Using a PPPoE Connection on page 121. For information on configuring bridged connections, see Adding Internet Connections to Bridges on page 237. Check Point UTM-1 Edge User Guide...
Page 131
Using Internet Setup Using a PPPoA (PPP over ATM) Connection Complete the fields using the relevant information in Internet Setup Fields on page 136. Chapter 5: Configuring the Internet Connection...
Page 132
The UTM-1 appliance attempts to connect to the Internet, and the Status Bar displays the Internet status “Connecting”. This may take several seconds. Once the connection is made, the Status Bar displays the Internet status “Connected”. Check Point UTM-1 Edge User Guide...
Page 133
Using Internet Setup Using an EoA (Ethernet over ATM) Connection Complete the fields using the relevant information in Internet Setup Fields on page 136. Chapter 5: Configuring the Internet Connection...
Page 134
The UTM-1 appliance attempts to connect to the Internet, and the Status Bar displays the Internet status “Connecting”. This may take several seconds. Once the connection is made, the Status Bar displays the Internet status “Connected”. Check Point UTM-1 Edge User Guide...
Page 135
Using Internet Setup Using a PPPoE (PPP over Ethernet) Connection Complete the fields using the relevant information in Internet Setup Fields on page 136. Chapter 5: Configuring the Internet Connection...
Page 136
The UTM-1 appliance attempts to connect to the Internet, and the Status Bar displays the Internet status “Connecting”. This may take several seconds. Once the connection is made, the Status Bar displays the Internet status “Connected”. Check Point UTM-1 Edge User Guide...
Page 137
Using Internet Setup Configuring an Ethernet-Based Connection In the Port drop-down list, do one of the following: • To configure an Ethernet-based connection through the WAN port, select WAN. • To configure an Ethernet-based connection through the DMZ/WAN2 port, select WAN2. This option is available in non-ADSL models only.
Page 138
Using Internet Setup Using a LAN Connection Complete the fields using the relevant information in Internet Setup Fields on page 136. Check Point UTM-1 Edge User Guide...
Page 139
Using Internet Setup New fields appear, depending on the check boxes you selected. Click Apply. The UTM-1 appliance attempts to connect to the Internet, and the Status Bar displays the Internet status “Connecting”. This may take several seconds. Once the connection is made, the Status Bar displays the Internet status “Connected”. Chapter 5: Configuring the Internet Connection...
Page 140
Using Internet Setup Using a Cable Modem Connection Complete the fields using the relevant information in Internet Setup Fields on page 136. Check Point UTM-1 Edge User Guide...
Page 141
Using Internet Setup New fields appear, depending on the check boxes you selected. Click Apply. The UTM-1 appliance attempts to connect to the Internet, and the Status Bar displays the Internet status “Connecting”. This may take several seconds. Once the connection is made, the Status Bar displays the Internet status “Connected”. Chapter 5: Configuring the Internet Connection...
Page 142
Using Internet Setup Using a PPPoE Connection Complete the fields using the relevant information in Internet Setup Fields on page 136. Check Point UTM-1 Edge User Guide...
Page 143
Using Internet Setup New fields appear, depending on the check boxes you selected. Click Apply. The UTM-1 appliance attempts to connect to the Internet, and the Status Bar displays the Internet status “Connecting”. This may take several seconds. Once the connection is made, the Status Bar displays the Internet status “Connected”. Chapter 5: Configuring the Internet Connection...
Page 144
Using Internet Setup Using a PPTP Connection Complete the fields using the relevant information in Internet Setup Fields on page 136. Check Point UTM-1 Edge User Guide...
Page 145
Using Internet Setup New fields appear, depending on the check boxes you selected. Click Apply. Chapter 5: Configuring the Internet Connection...
Page 146
Use this Internet connection type only if you are subscribed to Telstra® BigPond™ Internet. Telstra BigPond is a trademark of Telstra Corporation Limited. Complete the fields using the relevant information in Internet Setup Fields on page 136. Check Point UTM-1 Edge User Guide...
Page 147
Using Internet Setup New fields appear, depending on the check boxes you selected. Click Apply. The UTM-1 appliance attempts to connect to the Internet, and the Status Bar displays the Internet status “Connecting”. This may take several seconds. Once the connection is made, the Status Bar displays the Internet status “Connected”. Chapter 5: Configuring the Internet Connection...
Page 148
To configure a Dialup connection on a USB port (using a connected USB modem), select USBModem1. The Connection Type field displays Dialup. Complete the fields using the relevant information in Internet Setup Fields on page 136. Check Point UTM-1 Edge User Guide...
Page 149
Using Internet Setup New fields appear, depending on the check boxes you selected. Click Apply. The UTM-1 appliance attempts to connect to the Internet, and the Status Bar displays the Internet status “Connecting”. This may take several seconds. Once the connection is made, the Status Bar displays the Internet status “Connected”. Chapter 5: Configuring the Internet Connection...
Page 150
ISP. Encapsulation Select the encapsulation type to use for the DSL line, as specified by Type your ISP. PPP Settings Username Type your user name. Password Type your password. Confirm password Type your password. Check Point UTM-1 Edge User Guide...
Page 151
Using Internet Setup In this field… Do this… Service Type your service name. If your ISP has not provided you with a service name, leave this field empty. Server IP If you selected PPTP, type the IP address of the PPTP server as given by your ISP.
Page 152
Type the static IP address of your UTM-1 appliance. Subnet Mask Select the subnet mask that applies to the static IP address of your UTM- 1 appliance. Default Gateway Type the IP address of your ISP’s default gateway. Check Point UTM-1 Edge User Guide...
Page 153
Using Internet Setup In this field… Do this… Name Servers Obtain Domain Clear this option if you want the UTM-1 appliance to obtain an IP address Name Servers automatically using DHCP, but not to automatically configure DNS automatically servers. Obtain WINS Clear this option if you want the UTM-1 appliance to obtain an IP address Server automatically using DHCP, but not to automatically configure the WINS...
Page 154
As a general recommendation you should leave this field empty. If however you wish to modify the default MTU, it is recommended that you consult with your ISP first and use MTU values between 1300 and 1500. Check Point UTM-1 Edge User Guide...
Page 155
Using Internet Setup In this field… Do this… MAC Cloning A MAC address is a 12-digit identifier assigned to every network device. If your ISP restricts connections to specific, recognized MAC addresses, you must select this option to clone a MAC address. Note: When configuring MAC cloning for the secondary Internet connection, the DMZ/WAN2 port must be configured as WAN2;...
Page 156
Internet only if it is the Active Gateway in passive state the HA cluster. This is called WAN HA. This field is only enabled if HA is configured. For information on HA, see Configuring High Availability on page 243. Check Point UTM-1 Edge User Guide...
Page 157
Using Internet Setup In this field… Do this… Dead Connection Detection Probe Next Hop Select this option to automatically detect loss of connectivity to the default gateway. If you selected LAN, this is done by sending ARP requests to the default gateway.
Page 158
Internet connection is considered to be down. Use this option if you have Check Point VPN gateways, and you want loss of connectivity to these gateways to trigger ISP failover to an Internet connection from which these gateways are reachable.
Setting Up Dialup Modems In this field… Do this… If you chose the Ping Addresses connection probing method, type the IP 1, 2, 3 addresses or DNS names of the desired servers. If you chose the Probe VPN Gateway (RDP) connection probing method, type the IP addresses or DNS names of the desired VPN gateways.
Page 160
Connect an RS232 dialup modem to your UTM-1 appliance's serial port. For information on locating the serial port, see Introduction on page 1. Click Network in the main menu, and click the Ports tab. The Ports page appears. Check Point UTM-1 Edge User Guide...
Page 161
Setting Up Dialup Modems Next to Serial, click Edit. The Port Setup page appears. In the Assign to Network drop-down list, select Dialup. New fields appear. Chapter 5: Configuring the Internet Connection...
Page 162
Answer incoming Select this option to specify that the modem should answer incoming PPP calls PPP calls. This allows accessing the appliance out of band for maintenance purposes, in case the primary Internet connection fails. Check Point UTM-1 Edge User Guide...
Page 163
Setting Up Dialup Modems Setting Up a USB Modem Warning: Before attaching a USB modem, ensure that the total power drawn by all connected USB devices does not exceed 2.5W per port (0.5A at 5V). If the total current consumed by a port exceeds 0.5A, a powered USB hub must be used, to avoid damage to the gateway.
Page 164
To check that that the values you entered are correct, click Test. The page displays a message indicating whether the test succeeded. Configure a Dialup Internet connection on the USB port. See Using Internet Setup on page 113. Check Point UTM-1 Edge User Guide...
Page 165
Setting Up Dialup Modems Table 30: USB Dialup Fields In this field… Do this… Modem Type Select the modem type. You can select one of the predefined modem types or Custom. If you selected Custom, the Installation String field is enabled. Otherwise, it is filled in with the correct installation string for the modem type.
To view activity information for a connection, mouse-over the information icon next to the desired connection. A tooltip displays the number of bytes sent and received bytes through the connection. To refresh the information on this page, click Refresh. Check Point UTM-1 Edge User Guide...
Page 167
Viewing Internet Connection Information Table 31: Internet Page Fields Field Description Status Indicates the connection’s status. Duration Indicates the connection duration, if active. The duration is given in the format hh:mm:ss, where: hh=hours mm=minutes ss=seconds IP Address Your IP address. Enabled Indicates whether or not the connection is enabled.
Next to the Internet connection, do one of the following: • To enable the connection, click The button changes to and the connection is enabled. • To disable the connection, click The button changes to and the connection is disabled. Check Point UTM-1 Edge User Guide...
Using Quick Internet Connection/Disconnection Using Quick Internet Connection/Disconnection By clicking the Connect or Disconnect button (depending on the connection status) on the Internet page, you can establish a quick Internet connection using the currently-selected connection type. In the same manner, you can terminate the active connection. The Internet connection retains its Connected/Not Connected status until the UTM-1 appliance is rebooted.
Internet connections, the ratio between the connections' load balancing weights should reflect the ratio between the connections' bandwidths. Note: To ensure continuous Internet connectivity, if one of the Internet connections fails, all traffic will be routed to the other connection. Check Point UTM-1 Edge User Guide...
Page 171
Configuring WAN Load Balancing To configure WAN load balancing Configure the desired load balancing weight for both the primary and secondary Internet connections. For further information, see the Load Balancing Weight field in Using Internet Setup on page 113. Click Network in the main menu, and click the Internet tab. The Internet page appears.
Configuring Network Settings Chapter 6 Managing Your Network This chapter describes how to manage and configure your network connection and settings. This chapter includes the following topics: Configuring Network Settings..............159 Using Network Objects ................188 Configuring Network Service Objects............199 Using Static Routes ..................202 Managing Ports..................209 Configuring Network Settings Note: If you accidentally change the network settings to incorrect values and are...
Page 174
Configuring Network Settings Configuring the LAN Network To configure the LAN network Click Network in the main menu, and click the My Network tab. The My Network page appears. Click Edit in the LAN network’s row. Check Point UTM-1 Edge User Guide...
Page 175
Configuring Network Settings The Edit Network Settings page for the LAN network appears. In the Mode drop-down list, select Enabled. The fields are enabled. If desired, change your UTM-1 appliance’s internal IP address. See Changing IP Addresses on page 162. If desired, enable or disable Hide NAT.
Page 176
192.168.100.1 – 192.168.100.254. Click Apply. A warning message appears. Click OK. • The UTM-1 appliance's internal IP address and/or the internal network range are changed. • A success message appears. Do one of the following: Check Point UTM-1 Edge User Guide...
Page 177
Configuring Network Settings • If your computer is configured to obtain its IP address automatically (using DHCP), and the UTM-1 DHCP server is enabled, restart your computer. Your computer obtains an IP address in the new range. • Otherwise, manually reconfigure your computer to use the new address range using the TCP/IP settings.
Page 178
Using Network Objects on page 188. Note: The following DHCP server configurations are not available for the OfficeMode network: • Enabling and disabling the UTM-1 DHCP Server • Setting the DHCP range manually • Configuring DHCP relay Check Point UTM-1 Edge User Guide...
Page 179
Configuring Network Settings Enabling/Disabling the UTM-1 DHCP Server You can enable and disable the UTM-1 DHCP Server for internal networks. To enable/disable the UTM-1 DHCP server Click Network in the main menu, and click the My Network tab. The My Network page appears. In the desired network's row, click Edit.
Page 180
• To allow the DHCP server to set the IP address range, select the Automatic DHCP range check box. • To set the DHCP range manually: 1) Clear the Automatic DHCP range check box. Check Point UTM-1 Edge User Guide...
Page 181
Configuring Network Settings The DHCP IP range fields appear. 2) In the DHCP IP range fields, type the desired DHCP range. Click Apply. A warning message appears. Click OK. A success message appears If your computer is configured to obtain its IP address automatically (using DHCP), and either the UTM-1 DHCP server or another DHCP server is enabled, restart your computer.
Page 182
The My Network page appears. In the desired network's row, click Edit. The Edit Network Settings page appears. In the DHCP Server list, select Relay. The Automatic DHCP range check box is disabled, and new fields appear. Check Point UTM-1 Edge User Guide...
Page 183
Configuring Network Settings In the Primary DHCP Server IP field, type the IP address of the primary DHCP server. In the Secondary DHCP Server IP field, type the IP address of the DHCP server to use if the primary DHCP server fails. Click Apply.
Page 184
In the desired network's row, click Edit. The Edit Network Settings page appears. In the DHCP area, click Options. The DHCP Server Options page appears. Complete the fields using the relevant information in the following table. Check Point UTM-1 Edge User Guide...
Page 185
Configuring Network Settings New fields appear, depending on the check boxes you selected. Click Apply. If your computer is configured to obtain its IP address automatically (using DHCP), restart your computer. Your computer obtains an IP address in the DHCP address range. Chapter 6: Managing Your Network...
Page 186
(in the Internet Setup page). The WINS Server 1 and WINS Server 2 fields appear. WINS Server 1, 2 Type the IP addresses of the Primary and Secondary WINS servers to use instead of the gateway. Check Point UTM-1 Edge User Guide...
Page 187
Configuring Network Settings In this field… Do this… Automatically assign Clear this option if you do not want the DHCP server to pass the default gateway current gateway IP address to DHCP clients as the default gateway's IP address. Normally, it is recommended to leave this option selected. The Default Gateway field is enabled.
Page 188
If you have more than one computer in the DMZ network, connect a hub or switch to the DMZ port, and connect the DMZ computers to the hub. Click Network in the main menu, and click the Ports tab. Check Point UTM-1 Edge User Guide...
Page 189
Configuring Network Settings The Ports page appears. Next to the DMZ/WAN2 port, click Edit. Chapter 6: Managing Your Network...
Page 190
In the Mode drop-down list, select Enabled. The fields are enabled. 10. In the IP Address field, type the IP address of the DMZ network's default gateway. Note: The DMZ network must not overlap other networks. Check Point UTM-1 Edge User Guide...
Page 191
IP address to the VPN client, when the client connects and authenticates. The IP addresses are allocated from a pool called the OfficeMode network. Note: OfficeMode requires either Check Point SecureClient or an L2TP client to be installed on the VPN clients. It is not supported by Check Point SecuRemote.
Page 192
If desired, enable or disable Hide NAT. See Enabling/Disabling Hide NAT on page 163. If desired, configure DHCP options. See Configuring DHCP Server Options on page 169. Click Apply. A warning message appears. Click OK. A success message appears. Check Point UTM-1 Edge User Guide...
Page 193
Configuring Network Settings Configuring VLANs Your UTM-1 appliance allows you to partition your network into several virtual LAN networks (VLANs). A VLAN is a logical network behind the UTM-1 appliance. Computers in the same VLAN behave as if they were on the same physical network: traffic flows freely between them, without passing through a firewall.
Page 194
All outgoing traffic from a tag-based VLAN contains the VLAN's tag in the packet headers. Incoming traffic to the VLAN must contain the VLAN's tag as well, or the packets are dropped. Tagging ensures that traffic is directed to the correct VLAN. Figure 20: Tag-Based VLAN Check Point UTM-1 Edge User Guide...
Page 195
Configuring Network Settings • Port-based Port-based VLAN allows assigning the appliance's LAN ports to VLANs, effectively transforming the appliance's four-port switch into up to four firewall-isolated security zones. You can assign multiple ports to the same VLAN, or each port to a separate VLAN.
Page 196
WDS links For information on counting VAPs and WDS links, see Configuring a Wireless Network on page 265. For information on the default security policy for VLANs, see Default Security Policy on page 327. Check Point UTM-1 Edge User Guide...
Page 197
Configuring Network Settings Adding and Editing VLANs For information on adding and editing port-based VLANs, see Adding and Editing Port- Based VLANs on page 183. For information on adding and editing tag-based VLANs, see Adding and Editing Tag- Based VLANs on page 185. For information on adding and editing VAPs, see Configuring Virtual Access Points on page 294.
Page 198
In the Subnet Mask field, type the VLAN's internal network range. If desired, enable or disable Hide NAT. See Enabling/Disabling Hide NAT on page 163. If desired, configure a DHCP server. See Configuring a DHCP Server on page 164. Check Point UTM-1 Edge User Guide...
Page 199
Configuring Network Settings 10. Click Apply. A warning message appears. 11. Click OK. A success message appears. 12. Click Network in the main menu, and click the Ports tab. The Ports page appears. 13. Next to the LAN port you want to assign, click Edit. The Port Setup page appears.
Page 200
16. Configure a VLAN trunk (802.1Q) port on the VLAN-aware switch, according to the vendor instructions. Define the same VLAN IDs on the switch. 17. Connect the UTM-1 appliance's DMZ/WAN2 port to the VLAN-aware switch's VLAN trunk port. Check Point UTM-1 Edge User Guide...
Page 201
Configuring Network Settings Deleting VLANs To delete a VLAN If the VLAN is port-based, do the following: Click Network in the main menu, and click the Ports tab. The Ports page appears. Remove all port assignments to the VLAN, by selecting other networks in the drop-down lists.
DHCP server may reassign the IP address to a different computer. If you want to guarantee that a particular computer's IP address remains constant, you can reserve the IP address for use by the computer's MAC address only. This is called Check Point UTM-1 Edge User Guide...
Page 203
Using Network Objects DHCP reservation, and it is useful if you are hosting a public Internet server on your network. • Web Filtering enforcement You can specify whether or not to enforce the Web Filtering service and Web rules for the network object.
Page 204
The Network Objects page appears with a list of network objects. Do one of the following: • To add a network object, click New. • To edit an existing network object, click Edit next to the desired computer in the list. Check Point UTM-1 Edge User Guide...
Page 205
Using Network Objects The UTM-1 Network Object Wizard opens, with the Step 1: Network Object Type dialog box displayed. Do one of the following: • To specify that the network object should represent a single computer or device, click Single Computer. •...
Page 206
Reserve a fixed IP address for this computer option. If you chose Network, the dialog box does not include this option. Complete the fields using the information in the tables below. Click Next. Check Point UTM-1 Edge User Guide...
Page 207
Using Network Objects The Step 3: Save dialog box appears. Type a name for the network object in the field. Click Finish. Chapter 6: Managing Your Network...
Page 208
To add a network object, click Add next to the desired computer. • To edit a network object, click Edit next to the desired computer. The UTM-1 Network Object Wizard opens, with the Step 1: Network Object Type dialog box displayed. Check Point UTM-1 Edge User Guide...
Page 209
Using Network Objects Do one of the following: • To specify that the network object should represent a single computer or device, click Single Computer. • To specify that the network object should represent a network, click Network. Click Next. The Step 2: Computer Details dialog box appears.
Page 210
My HotSpot page. Furthermore, users on HotSpot networks will be able to access this computer without viewing the My HotSpot page. Exclude this computer Select this option to exclude this computer from the Web Filtering from Web Filtering service and Web rule enforcement. Check Point UTM-1 Edge User Guide...
Page 211
Using Network Objects Table 35: Network Object Fields for a Network In this field… Do this… IP Range Type the range of local computer IP addresses in the network. Perform Static NAT Select this option to map the network's IP address range to a range of (Network Address Internet IP addresses of the same size.
Page 212
The Network Objects page appears with a list of network objects. To delete a network object, do the following: In the desired network object's row, click the Erase icon. A confirmation message appears. Click OK. The network object is deleted. Check Point UTM-1 Edge User Guide...
Configuring Network Service Objects Configuring Network Service Objects You can add custom services as network service objects. This enables you to configure firewall rules, VStream Antivirus rules, custom NAT rules, and static routes for the services represented by the network service objects. Defining network service objects can make your policies easier to understand and maintain.
Page 214
To edit an existing network service object, click Edit next to the desired object in the list. The UTM-1 Network Service Wizard opens, with the Step 1: Network Service Details dialog box displayed. Complete the fields using the information in the table below. Click Next. Check Point UTM-1 Edge User Guide...
Page 215
Configuring Network Service Objects The Step 2: Network Service Name dialog box appears. Type a name for the network service object in the field. Click Finish. Table 36: Network Service Fields In this field… Do this… Protocol Select the network service's IP protocol. If you select Other, the Protocol Number field appears.
IP address. Note: If the static route's next hop is an Internet connection that is currently unavailable, the UTM-1 appliance sends matching traffic through the static route with the next-lowest metric. Check Point UTM-1 Edge User Guide...
Page 217
Using Static Routes Packets with a source, destination, or network service that do not match any defined static route are routed to the default gateway. To modify the default gateway, see Using a LAN Connection on page 124. When a static route is based on the packet's source, it is called a source route. Source routing can be used, for example, for load balancing between two Internet connections.
Page 218
The Static Routes page appears, with a list of existing static routes. Do one of the following: • To add a static route, click New Route. • To edit an existing static route, click Edit next to the desired route in the list. Check Point UTM-1 Edge User Guide...
Page 219
Using Static Routes The Static Route Wizard opens displaying the Step 1: Source and Destination dialog box. Complete the fields using the relevant information in the following table. Click Next. The Step 2: Next Hop and Metric dialog box appears. Complete the fields using the relevant information in the following table.
Page 220
Specified Network. This route applies to packets sent to a specific network. The Network and Netmask fields appear. Destination - Type the destination network's IP address. Network Destination - Select the destination network's subnet mask. Netmask Check Point UTM-1 Edge User Guide...
Page 221
Using Static Routes In this field… Do this… Service Specify the service used to send packets (service routing). This can be either of the following: • ANY. This route applies to packets sent using any service. • A specific service. Note: When defining a static route for a specific service, the Source and Destination fields must be set to ANY.
Page 222
The Static Routes page appears, with a list of existing static routes. To refresh the view, click Refresh. To delete a route, do the following: In the desired route's row, click the Erase icon. A confirmation message appears. Click OK. The route is deleted. Check Point UTM-1 Edge User Guide...
Managing Ports Managing Ports The UTM-1 appliance enables you to quickly and easily assign its ports to different uses, as shown in the following table. If desired, you can also disable ports. Table 38: Ports and Assignments You can assign this port... To these uses...
Page 224
Ethernet connection's duplex state. This is useful if you need to check whether the appliance's physical connections are working, and you can’t see the LEDs on front of the appliance. To view port statuses Click Network in the main menu, and click the Ports tab. Check Point UTM-1 Edge User Guide...
Page 225
Managing Ports The Ports page appears. In non-ADSL models, this page appears as follows: Chapter 6: Managing Your Network...
Page 226
Managing Ports In ADSL models, this page appears as follows: The page displays the information for each port, as described in the following table. To refresh the display, click Refresh. Check Point UTM-1 Edge User Guide...
Page 227
Managing Ports Table 39: Ports Fields This field… Displays… Assign To The port's current assignment. For example, if the DMZ/WAN2 port is currently used for the DMZ, the field displays "DMZ". Status The port's current status. This can be any of the following: •...
Page 228
Table 40: Modifying Port Assignments To assign a port to... See... No network The procedure below. This disables the port. The procedure below Check Point UTM-1 Edge User Guide...
Page 229
Managing Ports To assign a port to... See... VLAN or Configuring VLANs on page 179 VLAN Trunk A WAN Internet connection The procedure below. Note: When you configure an Ethernet-based Internet connection on a port, the port is automatically assigned to Internet use.
Page 230
• To disable a network port, select None. • To disable the Serial port, select Disabled. Click Apply. A warning message appears. Click OK. The port is reassigned to the specified network or purpose. Check Point UTM-1 Edge User Guide...
Page 231
Managing Ports Modifying Link Configurations By default, the UTM-1 appliance automatically detects the link speed and duplex. If desired, you can manually restrict the appliance's ports to a specific link speed and duplex setting. To modify a port's link configuration Click Network in the main menu, and click the Ports tab.
Page 232
For example, if you were using the DMZ/WAN2 port as WAN2, the port reverts to its DMZ assignment, and the secondary Internet connection moves to the WAN or ADSL port. Check Point UTM-1 Edge User Guide...
Page 233
Managing Ports Resetting All Ports to Defaults To reset all ports to defaults Click Network in the main menu, and click the Ports tab. The Ports page appears. Click Default. A confirmation message appears. Click OK. All ports are reset to their default assignments and to "Automatic Detection" link configuration.
Overview Chapter 7 Using Bridges This chapter describes how to connect multiple network segments at the data-link layer, using a bridge. This chapter includes the following topics: Overview ....................221 Workflow....................227 Adding and Editing Bridges ..............228 Adding Internal Networks to Bridges............232 Adding Internet Connections to Bridges ..........237 Deleting Bridges..................242 Overview...
Page 236
Overview directly, with no firewall filtering the traffic between them. The network interfaces operate as if they were connected by a hub or switch. Figure 22: Bridge with Four VLANs Check Point UTM-1 Edge User Guide...
Page 237
Overview For example, if you assign the LAN and primary WLAN networks to a bridge and disable the bridge's internal firewall, the two networks will act as a single, seamless network, and only traffic from the LAN and primary WLAN networks to other networks (for example, the Internet) will be inspected by the firewall.
Page 238
VLAN that belongs to a network segment other than the “Marketing” segment, the connection will be blocked and logged as “Spoofed IP”. Note: The following UTM-1 models do not support using bridge mode with port-based VLAN: • SBX166-LHGE-2 • SBX166-LHGE-3 Check Point UTM-1 Edge User Guide...
Page 239
Overview How Does Bridge Mode Work? Bridges operate at layer 2 of the OSI model, therefore adding a bridge to an existing network is completely transparent and does not require any changes to the network's structure. Each bridge maintains a forwarding table, which consists of <MAC Address, Port> associations.
Page 240
STP also uses this information to provide fault tolerance, by re- computing the topology in the event that a bridge or a network link fails. Figure 24: Dual Redundant Bridges with STP Check Point UTM-1 Edge User Guide...
Workflow Figure 25: Link Redundancy with STP Workflow To use a bridge Add a bridge. See Adding and Editing Bridges on page 228. Add the desired internal networks to the bridge. See Adding Internal Networks to Bridges on page 232. Add the desired Internet connections to the bridge.
For information on adding VStream Antivirus rules, see Adding and Editing Vstream Antivirus Rules on page 432. Adding and Editing Bridges To add or edit a bridge Click Network in the main menu, and click the My Network tab. The My Network page appears. Check Point UTM-1 Edge User Guide...
Page 243
Adding and Editing Bridges Do one of the following: • To add a bridge, click Add Bridge. • To edit a bridge, click Edit in the desired bridge's row. The Bridge Configuration page appears. Complete the fields using the following table. Click Apply.
Page 244
Specify whether to enable STP for this bridge, by selecting one of the following: • Enabled. STP is enabled. • Disabled. STP is disabled. This is the default value. If you selected Enabled, the Bridge Priority field appears. Check Point UTM-1 Edge User Guide...
Page 245
Adding and Editing Bridges In this field… Do this… Bridge Priority Select this bridge's priority. The bridge's priority is combined with a bridged network's MAC address to create the bridge's ID. The bridge with the lowest ID is elected as the root bridge. The other bridges in the tree calculate the shortest distance to the root bridge, in order to eliminate loops in the topology and provide fault tolerance.
To add an internal network to a bridge Click Network in the main menu, and click the My Network tab. The My Network page appears. Click Edit in the desired network's row. In the Mode drop-down list, select Bridged. Check Point UTM-1 Edge User Guide...
Page 247
Adding Internal Networks to Bridges New fields appear. Complete these fields as described below. If the assigned bridge uses STP, additional fields appear. Chapter 7: Using Bridges...
Page 248
Adding Internal Networks to Bridges Click Apply. A warning message appears. Click OK. A success message appears. In the My Network page, the internal network appears indented under the bridge. Check Point UTM-1 Edge User Guide...
Page 249
Adding Internal Networks to Bridges Table 43: Bridged Network Fields In this field… Do this… Assign to Bridge Select the bridge to which the connection should be assigned. Bridge Anti-Spoofing Select this option to enable anti-spoofing. If anti-spoofing is enabled, only IP addresses within the Allowed IP Range can be source IP addresses for packets on this network.
Page 250
Note: If you select the same priority for all ports, the root port will be elected based on the port's logical number. The default value is 128. This field only appears if the bridge uses STP. Check Point UTM-1 Edge User Guide...
Adding Internet Connections to Bridges Adding Internet Connections to Bridges To add an Internet connection to a bridge Click Network in the main menu, and click the Internet tab. The Internet page appears. Next to the desired Internet connection, click Edit. The Internet Setup page appears.
Page 252
Adding Internet Connections to Bridges New fields appear. Complete the fields specified in the table below. Complete the rest of the fields using the relevant information in Internet Setup Fields on page 136. Check Point UTM-1 Edge User Guide...
Page 253
Adding Internet Connections to Bridges New fields appear, depending on the selected options, and whether the selected bridge uses STP. Click Apply. The UTM-1 appliance attempts to connect to the Internet, and the Status Bar displays the Internet status “Connecting”. This may take several seconds. Once the connection is made, the Status Bar displays the Internet status “Connected”.
Page 254
All other ports are blocked. It is recommended to set a lower value for faster links. This field only appears if the selected bridge uses STP. It is relevant for regular bridged connections only. Check Point UTM-1 Edge User Guide...
Page 255
Adding Internet Connections to Bridges In this field… Do this… Spanning Tree Protocol - Port Select the port's priority. Priority The port's priority is combined with the port's logical number to create the port's ID. The port with the lowest ID is elected as the root port, which forwards frames out of the bridge.
Click Network in the main menu, and click the My Network tab. The My Network page appears. In the desired bridge’s row, click the Erase icon. A confirmation message appears. Click OK. The bridge is deleted. Check Point UTM-1 Edge User Guide...
Overview Chapter 8 Configuring High Availability This chapter describes how to configure High Availability (HA) for two or more UTM-1 appliances. This chapter includes the following topics: Overview ....................243 Configuring High Availability on a Gateway...........246 Sample Implementation on Two Gateways ..........250 Overview You can create a High Availability (HA) cluster consisting of two or more UTM-1 appliances.
Page 258
WAN virtual IP address, in the event that the Active Gateway fails. If desired, you can configure a WAN virtual IP address for the WAN2 interface, as well. Check Point UTM-1 Edge User Guide...
Page 259
Overview Note: To use a WAN virtual IP address, the Internet connection method must be "Static IP". PPP-based connections and dynamic IP connections are not supported. Before configuring HA, the following requirements must be met: • You must have at least two identical UTM-1 appliances. •...
Each appliance must have a different internal IP address. See Changing IP Addresses on page 162. Click Setup in the main menu, and click the High Availability tab. The High Availability page appears. Select the Gateway High Availability check box. Check Point UTM-1 Edge User Guide...
Page 261
Configuring High Availability on a Gateway The fields are enabled. Next to each network for which you want to enable HA, select the HA check box. The Internet-Primary field represents the WAN interface, and the Internet-Secondary field represents the WAN2 interface. In the Virtual IP field, type the default gateway IP address.
Page 262
Using Internet Setup on page 113. 10. If you configured a virtual IP address for the WAN or WAN2 interface, configure the Internet connection to use the "Static IP" connection method. See Using Internet Setup on page 113. Check Point UTM-1 Edge User Guide...
Page 263
Configuring High Availability on a Gateway Table 45: High Availability Page Fields In this field… Do this… Priority My Priority Type the gateway's priority. This must be an integer between 1 and 255. Internet Connection Tracking Internet - Primary Type the amount to reduce the gateway's priority if the primary Internet connection goes down.
Gateway A and Gateway B: Table 46: Gateway Details Gateway A Gateway B Internal Networks LAN, DMZ LAN, DMZ Internet Connections Primary and secondary Primary only LAN Network IP Address 192.169.100.1 192.169.100.2 LAN Network 255.255.255.0 255.255.255.0 Subnet Mask Check Point UTM-1 Edge User Guide...
Page 265
Sample Implementation on Two Gateways Gateway A Gateway B DMZ Network IP Address 192.169.101.1 192.169.101.2 DMZ Network 255.255.255.0 255.255.255.0 Subnet Mask The gateways have two internal networks in common, LAN and DMZ. This means that you can configure HA for the LAN network, the DMZ network, or both. You can use either of the networks as the synchronization interface.
Page 266
The Gateway High Availability area is enabled. The LAN and DMZ networks are listed. Next to LAN, select the HA check box. In the LAN network's Virtual IP field, type the default gateway IP address 192.168.100.3. Next to DMZ, select the HA check box. Check Point UTM-1 Edge User Guide...
Page 267
Sample Implementation on Two Gateways In the DMZ network's Virtual IP field, type the default gateway IP address 192.168.101.3. Click the Synchronization radio button next to DMZ. In the My Priority field, type "60". The low priority means that Gateway B will be the Passive Gateway. In the Internet - Primary field, type "20".
Overview Chapter 9 Using Traffic Shaper This chapter describes how to use Traffic Shaper to control the flow of communication to and from your network. This chapter includes the following topics: Overview ....................255 Setting Up Traffic Shaper.................256 Predefined QoS Classes................257 Adding and Editing Classes..............259 Viewing and Deleting Classes..............263 Restoring Traffic Shaper Defaults ............264...
Use Allow or Allow and Forward rules to assign different types of connections to QoS classes. For example, if Traffic Shaper is enabled for outgoing traffic, and you create an Allow rule associating all outgoing VPN traffic with the Urgent QoS class, then Traffic Check Point UTM-1 Edge User Guide...
Predefined QoS Classes Shaper will handle outgoing VPN traffic as specified in the bandwidth policy for the Urgent class. See Adding and Editing Rules on page 338. Note: Traffic Shaper must be enabled for the direction of traffic specified in the rule. Note: If you do not assign a connection type to a class, Traffic Shaper automatically assigns the connection type to the built-in "Default"...
Page 272
“Important” class. Low Priority Traffic that is not sensitive to long delays, and (Bulk Traffic) which does not require a high guaranteed bandwidth. For example, SMTP traffic (outgoing email). Check Point UTM-1 Edge User Guide...
Adding and Editing Classes Adding and Editing Classes To add or edit a QoS class Click Network in the main menu, and click the Traffic Shaper tab. The Quality of Service Classes page appears. Click Add. Chapter 9: Using Traffic Shaper...
Page 274
Complete the fields using the relevant information in the following table. Click Next. The Step 2 of 3: Advanced Options dialog box appears. Complete the fields using the relevant information in the following table. Check Point UTM-1 Edge User Guide...
Page 275
Adding and Editing Classes Note: Traffic Shaper may not enforce guaranteed rates and relative weights for incoming traffic as accurately as for outgoing traffic. This is because Traffic Shaper cannot control the number or type of packets it receives from the Internet; it can only affect the rate of incoming traffic by dropping received packets.
Page 276
Then type the maximum rate (in kilobits/second) in the field provided. Incoming Traffic: Select this option to guarantee a minimum bandwidth for incoming traffic Guarantee At belonging to this class. Then type the minimum bandwidth (in Least kilobits/second) in the field provided. Check Point UTM-1 Edge User Guide...
Viewing and Deleting Classes In this field… Do this… Incoming Traffic: Select this option to limit the rate of incoming traffic belonging to this Limit rate to class. Then type the maximum rate (in kilobits/second) in the field provided. DiffServ Code Select this option to mark packets belonging to this class with a DiffServ Point Code Point (DSCP), which is an integer between 0 and 63.
Rules page. To restore Traffic Shaper defaults Click Network in the main menu, and click the Traffic Shaper tab. The Quality of Service Classes page appears. Click Restore Defaults. A confirmation message appears. Click OK. Check Point UTM-1 Edge User Guide...
Overview Chapter 10 Working with Wireless Networks This chapter describes how to configure wireless internal networks. This chapter includes the following topics: Overview ....................265 Configuring Wireless Networks ...............273 Troubleshooting Wireless Connectivity ...........302 Overview Your UTM-1 wireless appliance features a built-in 802.11b/g access point that is tightly integrated with the firewall and VPN.
Page 280
Guest network a low priority, and by enabling Secure HotSpot on this network, you could define terms of use that the guest users must accept before accessing the Internet. In contrast, the Employee VAP would use the more secure WPA2-Enterprise Check Point UTM-1 Edge User Guide...
Page 281
Overview (802.11i) encryption standard and allow employees to access company resources such as the intranet. You can configure up to three VAPs, in addition to the primary WLAN. For information on configuring VAPs, see Configuring VAPs on page 294. Wireless Distribution System Links The UTM-1 appliance enables you to extend the primary WLAN's coverage area, by creating a Wireless Distribution System (WDS).
Page 282
When used together with bridge mode and Spanning Tree Protocol (STP), you can use WDS links to create redundant topologies, such as a loop or mesh of linked access points. Figure 27: Two Access Points Linked by a WDS Bridge Check Point UTM-1 Edge User Guide...
Page 283
Overview Figure 28: Redundant Loop of Access Points Linked by WDS and STP You can configure up to seven WDS links, in addition to the primary WLAN. For information on configuring WDS links, see Configuring WDS Links on page 298. Note: All access points in a WDS must use the same radio channel for the WDS link and for communicating with wireless stations.
Page 284
No security method is used. This option is not recommended, because it allows unauthorized users to access your wireless network, although you can still limit access from the wireless network by creating firewall rules. This method is suitable for creating public access points. Check Point UTM-1 Edge User Guide...
Page 285
Overview Security Description Protocol WEP encryption In the WEP (Wired Equivalent Privacy) encryption security method, wireless stations must use a pre-shared key to connect to your network. This method is not recommended, due to known security flaws in the WEP protocol. It is provided for compatibility with existing wireless deployments.
Page 286
LAN are encrypted and authenticated. For information, see Internal VPN Server on page 475 and Setting Up Your UTM-1 Appliance as a VPN Server on page 476. Check Point UTM-1 Edge User Guide...
Configuring Wireless Networks Configuring Wireless Networks Note: It is recommended to configure wireless networks via Ethernet and not via a wireless connection, because the wireless connection could be broken after making a change to the configuration. Using the Wireless Configuration Wizard The Wireless Configuration Wizard provides a quick and simple way of setting up your basic primary WLAN parameters for the first time.
Page 288
The Wireless Configuration Wizard opens, with the Wireless Configuration dialog box displayed. Select the Enable wireless networking check box to enable the primary WLAN. The fields are enabled. Complete the fields using the information in Basic WLAN Settings Fields on page 284. Click Next. Check Point UTM-1 Edge User Guide...
Page 289
Configuring Wireless Networks The Wireless Security dialog box appears. Do one of the following: • Click WPA-Personal to use the WPA-Personal security mode. WPA-Personal (also called WPA-PSK) uses a passphrase for authentication. This method is recommended for small, private wireless networks, which want to authenticate and encrypt wireless data but do not want to install a RADIUS server.
Page 290
LAN to the WLAN will be allowed. To allow traffic from the WLAN to the LAN, you must create firewall rules. For information, see Using Firewall Rules. 11. Click Next. WPA-Personal If you chose WPA-Personal, the Wireless Configuration-WPA-Personal dialog box appears. Check Point UTM-1 Edge User Guide...
Page 291
Configuring Wireless Networks Do the following: In the text box, type the passphrase for accessing the network, or click Random to randomly generate a passphrase. This must be between 8 and 63 characters. It can contain spaces and special characters, and is case-sensitive. Click Next.
Page 292
Configuring Wireless Networks The Wireless Security Complete dialog box appears. Click Finish. The wizard closes. Prepare the wireless stations. Check Point UTM-1 Edge User Guide...
Page 293
Configuring Wireless Networks If you chose WEP, the Wireless Configuration-WEP dialog box appears. Do the following: Choose a WEP key length. The possible key lengths are: • 64 Bits - The key length is 10 hexadecimal characters. • 128 Bits - The key length is 26 hexadecimal characters. •...
Page 294
For information on configuring RADIUS servers, see Using RADIUS Authentication on page 553. Click Network in the main menu, and click the My Network tab. The My Network page appears. In the desired wireless network's row, click Edit. Check Point UTM-1 Edge User Guide...
Page 295
Configuring Wireless Networks The Edit Network Settings page appears. In the Mode drop-down list, select Enabled. The fields are enabled. In the IP Address field, type the IP address of the wireless network network's default gateway. The wireless network must not overlap other networks. In the Subnet Mask field, type the wireless network’s internal network range.
Page 296
10. Complete the fields using the information in Basic Wireless Settings Fields on page 284. 11. To configure advanced settings, click Show Advanced Settings and complete the fields using the information in Advanced Wireless Settings Fields on page 289. Check Point UTM-1 Edge User Guide...
Page 297
Configuring Wireless Networks New fields appear. 12. Click Apply. A warning message appears, telling you that you are about to change your network settings. 13. Click OK. A success message appears. Chapter 10: Working with Wireless Networks...
Page 298
Select the country where you are located. Warning: Choosing an incorrect country may result in the violation of government regulations. This field only appears when configuring the primary WLAN, and it is inherited by all VAPs and WDS links. Check Point UTM-1 Edge User Guide...
Page 299
Configuring Wireless Networks In this field… Do this… Operation Mode Select an operation mode: • 802.11b (11 Mbps). Operates in the 2.4 GHz range and offers a maximum theoretical rate of 11 Mbps. When using this mode, only 802.11b stations will be able to connect. •...
Page 300
25 MHz (5 channels) apart. Alternatively, you can reduce the transmission power. This field only appears when configuring the primary WLAN, and it is inherited by all VAPs and WDS links. Check Point UTM-1 Edge User Guide...
Page 301
Configuring Wireless Networks In this field… Do this… Security Select the security protocol to use. For information on the supported security protocols, see Wireless Security Protocols on page 270. If you select WEP encryption, the WEP Keys area opens. If you select WPA-Enterprise, the Require WPA2 (802.11i) and WPA Encryption fields appear.
Page 302
128 Bits. The key length is 26 characters. • 152 Bits. The key length is 32 characters. Note: Some wireless card vendors call these lengths 40/104/128, respectively. Note: WEP is generally considered to be insecure, regardless of the selected key length. Check Point UTM-1 Edge User Guide...
Page 303
Configuring Wireless Networks In this field… Do this… Type the WEP key, or click Random to randomly generate a key matching Key 1, 2, 3, 4 text the selected length. The key is composed of hexadecimal characters 0-9 and A-F, and is not case-sensitive. Table 51: Advanced Wireless Settings Fields In this field…...
Page 304
Automatic. The UTM-1 appliance automatically selects a rate. This is the default. • A specific rate This field only appears when configuring the primary WLAN, and it is inherited by all VAPs and WDS links. Check Point UTM-1 Edge User Guide...
Page 305
Configuring Wireless Networks In this field… Do this… Transmitter Power Select the transmitter power. Setting a higher transmitter power increases the access point's range. A lower power reduces interference with other access points in the vicinity. The default value is Full. It is not necessary to change this value, unless there are other access points in the vicinity.
Page 306
If your network is congested, and the users are distant from one another, set the RTS threshold to a low value (around 500). Setting a value equal to the fragmentation threshold effectively disables RTS. The default value is 2346. Check Point UTM-1 Edge User Guide...
Page 307
Configuring Wireless Networks In this field… Do this… Extended Range Specify whether to use Extended Range (XR) mode: Mode (XR) • Disabled. XR mode is disabled. • Enabled. XR mode is enabled. XR will be automatically negotiated with XR-enabled wireless stations and used as needed.
Page 308
For information on configuring the primary WLAN manually, see Manually Configuring a Wireless Network on page 280. For information on using a wizard to configure the primary WLAN, see Using the Wireless Wizard on page 273. Check Point UTM-1 Edge User Guide...
Page 309
Configuring Wireless Networks If you want to use WPA-Enterprise or 802.1x security mode for the VAP, make sure a RADIUS server is configured. For information on security modes, see Basic Wireless Settings Fields on page 284. For information on configuring RADIUS servers, see Using RADIUS Authentication on page 553.
Page 310
In the Subnet Mask field, type the VAP's internal network range. 10. If desired, enable or disable Hide NAT. See Enabling/Disabling Hide NAT on page 163. 11. If desired, configure a DHCP server. See Configuring a DHCP Server on page 164. Check Point UTM-1 Edge User Guide...
Page 311
Configuring Wireless Networks 12. Complete the fields using the information in Basic Wireless Settings Fields on page 284. 13. To configure advanced settings, click Show Advanced Settings and complete the fields using the information in Advanced Wireless Settings Fields on page 289.
Page 312
WLAN network, all WDS links are automatically disabled. The procedure below explains how to add or edit a WDS link. For information on deleting a WDS link, see Deleting VLANs on page 187. Check Point UTM-1 Edge User Guide...
Page 313
Configuring Wireless Networks To add or edit a WDS link Configure and enable the primary WLAN. For information on configuring the primary WLAN manually, see Manually Configuring a Wireless Network on page 280. For information on using a wizard to configure the primary WLAN, see Using the Wireless Wizard on page 273.
Page 314
10. Complete the fields using the relevant information in Basic Wireless Settings Fields on page 284. 11. To configure advanced settings, click Show Advanced Settings and complete the fields using the relevant information in Advanced Wireless Settings Fields on page 289. Check Point UTM-1 Edge User Guide...
Page 315
Configuring Wireless Networks New fields appear. 12. Click Apply. Note: Both sides of the WDS link must use the same radio channel and security settings. Note: WDS links support using the WEP security mode or no security. However, the access point can use any supported security protocol to communicate with wireless stations, including the WPA/WPA2 protocols.
• On the wireless station, open a command window and type ping my.firewall. If you see a large number of dropped packets, you are experiencing poor reception. Check Point UTM-1 Edge User Guide...
Page 317
Troubleshooting Wireless Connectivity Wireless reception is poor. What should I do? • Adjust the angle of the antennas, until the reception improves. The antennas radiate horizontally in all directions. • If both antennas are connected to the UTM-1 appliance, check that the Antenna Selection parameter in the primary WLAN's advanced settings is set to Automatic (see Manually Configuring a Wireless Network on page 280).
Page 318
(802.11g or 802.11g Super), and that this standard is enabled in the station software. Transmission speed is determined by the slowest station associated with the access point. For a list of wireless stations that support 802.11g Super, see www.super-ag.com. Check Point UTM-1 Edge User Guide...
Viewing the Event Log Chapter 11 Viewing Reports This chapter describes the UTM-1 Portal reports. This chapter includes the following topics: Viewing the Event Log................305 Using the Traffic Monitor ................308 Viewing Computers..................312 Viewing Connections ................314 Viewing Wireless Statistics ..............316 Viewing ADSL Statistics .................320 Viewing the Routing Table...............322 Viewing the Event Log You can track network activity using the Event Log.
Page 320
(Microsoft Excel) file, and then store it for analysis purposes or send it to technical support. Note: You can configure the UTM-1 appliance to send event logs to a Syslog server. For information, see Configuring Syslog Logging on page 584. Check Point UTM-1 Edge User Guide...
Page 321
Viewing the Event Log To view the event log Click Reports in the main menu, and click the Event Log tab. The Event Log page appears. If an event is highlighted in red, indicating a blocked attack on your network, you can display the attacker’s details, by clicking on the IP address of the attacking machine.
All QoS Classes report, the traffic is color-coded by QoS class. Table 53: Traffic Monitor Color Coding for Networks Traffic marked in this color… Indicates… Blue VPN-encrypted traffic Traffic blocked by the firewall Green Traffic accepted by the firewall Check Point UTM-1 Edge User Guide...
Page 323
Using the Traffic Monitor You can export a detailed traffic report for all enabled networks and all defined QoS classes, using the procedure Exporting General Traffic Reports on page 310. Viewing Traffic Reports To view a traffic report Click Reports in the main menu, and click the Traffic tab. The Traffic Monitor page appears.
Page 324
The Save As dialog box appears. Browse to a destination directory of your choice. Type a name for the configuration file and click Save. A *.csv file is created and saved to the specified directory. Check Point UTM-1 Edge User Guide...
Page 325
Using the Traffic Monitor Configuring Traffic Monitor Settings You can configure the interval at which the UTM-1 appliance should collect traffic data for network traffic reports. To configure Traffic Monitor settings Click Reports in the main menu, and click the Traffic tab. The Traffic Monitor page appears.
If there are wireless networks, the wireless stations are shown under the network to which they are connected. For information on viewing statistics for these computers, see Viewing Wireless Statistics on page 316. If a wireless station has been blocked Check Point UTM-1 Edge User Guide...
Page 327
Viewing Computers from accessing the Internet through the UTM-1 appliance, the reason why it was blocked is shown in red. If a network is bridged, the bridge's name appears in parentheses next to the network's name. If you are exceeding the maximum number of computers allowed by your license, a warning message appears, and the computers over the node limit are marked in red.
Internet. Note: The report does not display connections between bridged networks, where Firewall Between Members is disabled. To view the active connections Click Reports in the main menu, and click the Connections tab. Check Point UTM-1 Edge User Guide...
Page 329
Viewing Connections The Connections page appears. The page displays the information in the following table. To refresh the display, click Refresh. To view information on the destination machine, click its IP address. The UTM-1 appliance queries the Internet WHOIS server, and a window displays the name of the entity to which the IP address is registered and their contact information.
If the primary WLAN is enabled, you can view wireless statistics for the primary WLAN and VAPs, or for individual wireless stations. To view statistics for the primary WLAN and VAPs Click Reports in the main menu, and click the Wireless tab. Check Point UTM-1 Edge User Guide...
Page 331
Viewing Wireless Statistics The Wireless page appears. The page displays the information in the following tables. To refresh the display, click Refresh. Table 55: Wireless Statistics This field… Displays… Status Wireless Mode The operation mode used by the primary WLAN, followed by the transmission rate in Mbps Domain The UTM-1 access point's region...
Page 332
Discarded Retries The total number of discarded retry packets that were transmitted and received Discarded Misc The total number of transmitted and received packets that were discarded for other reasons Check Point UTM-1 Edge User Guide...
Page 333
Viewing Wireless Statistics To view statistics for a wireless station Click Reports in the main menu, and click the My Computers tab. The My Computers page appears. The following information appears next to each wireless station: • The signal strength in dB •...
If you are using an ADSL model, you can view statistics for the ADSL connection. To view ADSL statistics Click Reports in the main menu, and click the ADSL tab. The ADSL page appears. The page displays the information in the following table. Check Point UTM-1 Edge User Guide...
Page 335
Viewing ADSL Statistics To refresh the display, click Refresh. Table 57: ADSL Statistics This field… Displays… Mode The ADSL connection's type (PPPoE, PPPoA, EoA) Status The ADSL connection's current status (OK, Modem Initializing, No Sync, Establishing Connection, Connected, Disabled) DSL Standard The DSL line's standard ADSL Annex The UTM-1 ADSL model (Annex A, Annex B)
To view the current routing table Click Reports in the main menu, and click the Routing tab. The Routing Table page appears. The page displays the information in the following table. To refresh the display, click Refresh. Check Point UTM-1 Edge User Guide...
Page 337
Viewing the Routing Table Table 58: Routing Table Fields This field… Displays… Source The route's source Destination The route's destination Service The network service for which the route is configured Gateway The gateway's IP address Metric The route's metric Interface The interface for which the route is configured Origin The route's type:...
Viewing the Routing Table Chapter 12 Setting Your Security Policy This chapter describes how to set up your UTM-1 appliance security policy. You can enhance your security policy by subscribing to services such as Web Filtering and Email Filtering. You can also integrate all UTM-1 appliances into an overall enterprise security policy by connecting to SMART management.
Each rule specifies the source, destination, service, and action to be taken for each connection. A rule also specifies how a communication is tracked, logged, and displayed. In other words, the rule base is the implementation of the security policy. Check Point UTM-1 Edge User Guide...
Default Security Policy Security Policy Enforcement The UTM-1 appliance uses the unique, patented INSPECT engine to enforce the configured security policy and to control traffic between networks. The INSPECT engine examines all communication layers and extracts only the relevant data, enabling highly efficient operation, support for a large number of protocols and applications, and easy extensibility to new applications and services.
Enforces basic control on All inbound traffic is blocked to the external UTM-1 incoming connections, appliance IP address, except for ICMP echoes while permitting all ("pings"). outgoing connections. All outbound connections are allowed. Check Point UTM-1 Edge User Guide...
Page 343
Setting the Firewall Security Level This Does this… Further Details level… Medium Enforces strict control on All inbound traffic is blocked. all incoming connections, All outbound traffic is allowed to the Internet while permitting safe except for Windows file sharing (NBT ports 137, outgoing connections.
Page 344
To change the firewall security level Click Security in the main menu, and click the Firewall tab. The Firewall page appears. Drag the security lever to the desired level. The UTM-1 appliance security level changes accordingly. Check Point UTM-1 Edge User Guide...
Configuring Servers Configuring Servers Note: If you do not intend to host any public Internet servers in your network (such as a Web Server, Mail Server, or an exposed host), you can skip this section. The UTM-1 appliance enables you to configure the following types of public Internet servers: •...
Page 346
The Servers page appears, displaying a list of services and a host IP address for each allowed service. Complete the fields using the information in the following table. Click Apply. A success message appears. Check Point UTM-1 Edge User Guide...
Page 347
Configuring Servers Table 60: Servers Page Fields In this Do this… column… Allow Select the check box next to the public server you want to configure. This can be either of the following: • A specific service or application (rows 1-9) •...
The UTM-1 appliance processes user-defined rules in the order they appear in the Rules table, so that rule 1 is applied before rule 2, and so on. This enables you to define exceptions to rules, by placing the exceptions higher up in the Rules table. Check Point UTM-1 Edge User Guide...
Page 349
Using Rules For example, if you want to block all outgoing FTP traffic, except traffic from a specific IP address, you can create a rule blocking all outgoing FTP traffic and move the rule down in the Rules table. Then create a rule allowing FTP traffic from the desired IP address and move this rule to a higher location in the Rules table than the first rule.
Page 350
Urgent class. For information on Traffic Shaper and QoS classes, see Using Traffic Shaper. Note: You must use this type of rule to allow incoming connections if your network uses Hide NAT. Check Point UTM-1 Edge User Guide...
Page 351
Using Rules Rule Description Allow This rule type enables you to do the following: • Permit outgoing access from your internal network to a specific service on the Internet. Permit incoming access from the Internet to a specific service in your internal network.
Page 352
Click Security in the main menu, and click the Rules tab. The Rules page appears. Do one of the following: • To add a new rule, click Add Rule. • To edit an existing rule, click the Edit icon next to the desired rule. Check Point UTM-1 Edge User Guide...
Page 353
Using Rules The UTM-1 Firewall Rule wizard opens, with the Step 1: Rule Type dialog box displayed. Select the type of rule you want to create. Click Next. The Step 2: Service dialog box appears. The example below shows an Allow and Forward rule. Chapter 12: Setting Your Security Policy...
Page 354
Using Rules Complete the fields using the relevant information in the following table. Click Next. The Step 3: Destination & Source dialog box appears. To configure advanced settings, click Show Advanced Settings. New fields appear. Check Point UTM-1 Edge User Guide...
Page 355
Using Rules Complete the fields using the relevant information in the following table. Click Next. The Step 4: Rule Options dialog box appears. 10. Complete the fields using the relevant information in the following table. 11. Click Next. Chapter 12: Setting Your Security Policy...
Page 356
You must then select the desired service or network service object from the drop-down list. Custom Service Click this option to specify that the rule should apply to a specific non- standard service. The Protocol and Port Range fields are enabled. You must fill them in. Check Point UTM-1 Edge User Guide...
Page 357
Using Rules In this field… Do this… Protocol Select the protocol for which the rule should apply (ESP, GRE, TCP, UDP, ICMP, IGMP, or OSPF). To specify that the rule should apply for any protocol, select ANY. To specify a protocol by number, select Other. The Protocol Number field appears.
Page 358
For information on Traffic Shaper and QoS classes, see Using Traffic Shaper. This drop-down list only appears when defining an Allow rule or an Allow and Forward rule. Check Point UTM-1 Edge User Guide...
Page 359
Using Rules In this field… Do this… Redirect to port Select this option to redirect the connections to a specific port. You must then type the desired port in the field provided. This option is called Port Address Translation (PAT), and is only available when defining an Allow and Forward rule.
Page 360
A tooltip displays the rule's description. To delete a rule, do the following. In the desired rule's row, click the Erase icon. A confirmation message appears. Click OK. The rule is deleted. Check Point UTM-1 Edge User Guide...
Using Port-Based Security Using Port-Based Security The UTM-1 appliance supports the IEEE 802.1x standard for secure RADIUS authentication of users and devices that are directly attached to UTM-1 appliance's LAN and DMZ ports, as well as the wireless LAN. When an 802.1x security scheme is implemented for a port, users attempting to connect to that port are required to authenticate using their network user name and password.
Page 362
To configure a Quarantine network other than the LAN or DMZ, add a port- based VLAN network. See Adding and Editing Port-Based VLANs on page 183. Click Network in the main menu, and click the Ports tab. Check Point UTM-1 Edge User Guide...
Page 363
Using Port-Based Security The Ports page appears. Next to the desired port, click Edit. Chapter 12: Setting Your Security Policy...
Page 364
In the Port Security drop-down list, select 802.1x. To configure a Quarantine network, in the Quarantine Network drop-down list, select the network that should be the Quarantine network. 10. Click Apply. A warning message appears. 11. Click OK. Check Point UTM-1 Edge User Guide...
Using Secure HotSpot Resetting 802.1x Locking When 802.1x port-based security is configured for a LAN port, the first host that attempts to connect to this port is “locked” to the port. In order to connect a different computer to the port, you must first reset 802.1x locking. To reset 802.1x locking on all ports Click Network in the main menu, and click the Ports tab.
Page 366
My HotSpot page. Furthermore, users will be able to access the excluded network object without viewing the My HotSpot page. For information on excluding network objects from HotSpot enforcement, see Using Network Objects on page 188. Check Point UTM-1 Edge User Guide...
Page 367
Using Secure HotSpot Important: SecuRemote/SecureClient VPN software users who are authenticated by the Internal VPN Server are automatically exempt from HotSpot enforcement. This allows, for example, authenticated employees to gain full access to the corporate LAN, while guest users are permitted to access the Internet only. Note: HotSpot enforcement can block traffic passing through the firewall;...
Page 368
• To enable Secure HotSpot for a specific network, select the check box next to the network. • To disable Secure HotSpot for a specific network, clear the check box next to the network. Check Point UTM-1 Edge User Guide...
Page 369
Using Secure HotSpot Click Apply. Customizing Secure HotSpot To customize Secure HotSpot Click Security in the main menu, and click the HotSpot tab. The My HotSpot page appears. Complete the fields using the information in the following table. Additional fields may appear. Chapter 12: Setting Your Security Policy...
Page 370
Select this option to allow a single user to log on to My HotSpot from multiple login from more computers at the same time. than one computer at the same time Use HTTPS Select this option to use HTTPS for Secure HotSpot. Check Point UTM-1 Edge User Guide...
Using NAT Rules In this field… Do this… After login, To redirect users to a specific URL after logging on to My HotSpot, select this redirect to URL option and type the desired URL in the field provided. For example, you can redirect authenticated users to your company’s Web site or a “Welcome”...
Page 372
IP addresses in the larger range to the final IP address in the smaller range. • Service-Based NAT. Translation of a connection's original service to a different service. Check Point UTM-1 Edge User Guide...
Page 373
Using NAT Rules The UTM-1 appliance also supports implicitly defined NAT rules. Such rules are created automatically upon the following events: • Hide NAT is enabled on an internal network • An Allow and Forward firewall rule is defined • Static NAT is configured for a network object (for information, see Using Network Objects on page 188) •...
Page 374
Click Security in the main menu, and click the NAT tab. The Address Translation page appears. Do one of the following: • To add a new rule, click New. • To edit an existing rule, click the Edit icon next to the desired rule. Check Point UTM-1 Edge User Guide...
Page 375
Using NAT Rules The Address Translation wizard opens, with the Step 1 of 3: Original Connection Details dialog box displayed. Complete the fields using the relevant information in the following table. Click Next. The Step 2 of 3: Translations to Perform dialog box appears. Complete the fields using the relevant information in the following table.
Page 376
To specify an IP address, select Specified IP and type the desired IP address in the field provided. To specify an IP address range, select Specified Range and type the desired IP address range in the fields provided. Check Point UTM-1 Edge User Guide...
Page 377
Using NAT Rules Field Description And the Select the original destination of the connections you want to translate. destination is To specify an IP address, select Specified IP and type the desired IP address in the text box. To specify an IP address range, select Specified Range and type the desired IP address range in the fields provided.
Page 378
Implicitly defined NAT rules are marked Automatic Rule in the right-most column. To delete a custom NAT rule, do the following. In the desired rule's row, click the Erase icon. A confirmation message appears. Check Point UTM-1 Edge User Guide...
Using Web Rules Click OK. The rule is deleted. Using Web Rules You can block or allow access to specific Web pages, by defining Web rules. If a user attempts to access a blocked page, the Access Denied page appears. For information on customizing this page, see Customizing the Access Denied Page on page 373.
Page 380
The UTM-1 appliance processes Web rules in the order they appear in the Web Rules table, so that rule 1 is applied before rule 2, and so on. This enables you to define exceptions to rules, by placing the exceptions higher up in the Web Rules table. Check Point UTM-1 Edge User Guide...
Page 381
Using Web Rules For example, if you want to block all the pages of a particular Web site, except a specific page, you can create a rule blocking access to all of the Web site's pages and move the rule down in the Web Rules table.
Page 382
The Web Rules page appears. Do one of the following: • To add a new rule, click Add Rule. • To edit an existing rule, click the Edit icon next to the desired rule. Check Point UTM-1 Edge User Guide...
Page 383
Using Web Rules The UTM-1 Web Rule Wizard opens, with the Step 1: Rule Type dialog box displayed. Select the type of rule you want to create. Click Next. The Step 2: Rule Location dialog box appears. The example below shows a Block rule. Chapter 12: Setting Your Security Policy...
Page 384
Using Web Rules Complete the fields using the relevant information in the following table. Click Next. The Step 3: Confirm Rule dialog box appears. Click Finish. The new rule appears in the Web Rules page. Check Point UTM-1 Edge User Guide...
Page 385
Using Web Rules Table 66: Web Rules Fields In this field… Do this… Block/Allow Type the URL or IP address to which the rule should apply. access to the Wildcards (*) are supported. For example, to block all URLs that start with following URL http://www.casino- "http://www.casino-", set this field's value to:...
Page 386
The Web Rules page appears with a list of existing Web rules. To delete a rule, do the following. In the desired rule's row, click the Erase icon. A confirmation message appears. Click OK. The rule is deleted. Check Point UTM-1 Edge User Guide...
Page 387
Using Web Rules Customizing the Access Denied Page The Access Denied page appears when a user attempts to access a page that is blocked either by a Web rule or by the Web Filtering service. You can customize this page using the following procedure.
Page 388
To display the Access Denied page using HTTPS, select the Use HTTPS check box. To preview the Access Denied page, click Preview. A browser window opens displaying the Access Denied page. Click Apply. Your changes are saved. Check Point UTM-1 Edge User Guide...
SmartDefense Categories .................383 Resetting SmartDefense to its Defaults ............424 Overview The UTM-1 appliance includes Check Point SmartDefense Services, based on Check Point Application Intelligence. SmartDefense provides a combination of attack safeguards and attack-blocking tools that protect your network in the following ways: •...
After using the wizard, you can fine tune the policy settings using the SmartDefense tree. See Using the SmartDefense Tree on page 381. To configure the SmartDefense policy using the wizard Click Security in the main menu, and click the SmartDefense tab. Check Point UTM-1 Edge User Guide...
Page 391
Configuring SmartDefense The SmartDefense page appears. Click SmartDefense Wizard. The SmartDefense Wizard opens, with the Step 1: SmartDefense Level dialog box displayed. Chapter 13: Using SmartDefense...
Page 392
For information on the levels, see the following table. Click Next. The Step 2: Application Intelligence Server Types dialog box appears. Select the check boxes next to the types of public servers that are running on your network. Click Next. Check Point UTM-1 Edge User Guide...
Page 393
Configuring SmartDefense The Step 3: Application Blocking dialog box appears. Select the check boxes next to the types of applications you want to block from running on your network. Click Next. The Step 4: Confirmation dialog box appears. Click Finish. Chapter 13: Using SmartDefense...
Page 394
Enables the same protections as High level, as well as the following: Extra Strict • Strict TCP (Log + Block) • Small PMTU (Log + Block) • Max Ping Size (set to 512) • Network Quota Check Point UTM-1 Edge User Guide...
Page 395
Configuring SmartDefense Using the SmartDefense Tree For convenience, SmartDefense is organized as a tree, in which each branch represents a category of settings. When a category is expanded, the settings it contains appear as nodes. For information on each category and the nodes it contains, see SmartDefense Categories on page 383. Each node represents an attack type, a sanity check, or a protocol or service that is vulnerable to attacks.
Page 396
To modify the node's current settings, do the following: a) Complete the fields using the relevant information in SmartDefense Categories on page 383. b) Click Apply. To reset the node to its default values: a) Click Default. Check Point UTM-1 Edge User Guide...
SmartDefense Categories A confirmation message appears. b) Click OK. The fields are reset to their default values, and your changes are saved. SmartDefense Categories SmartDefense includes the following categories: • Denial of Service on page 383 • FTP on page 410 •...
Page 398
Block. Block the attack. This is the default. • None. No action. Track Specify whether to log Teardrop attacks, by selecting one of the following: • Log. Log the attack. This is the default. • None. Do not log the attack. Check Point UTM-1 Edge User Guide...
Page 399
SmartDefense Categories Ping of Death In a Ping of Death attack, the attacker sends a fragmented PING request that exceeds the maximum IP packet size (64KB). Some operating systems are unable to handle such requests and crash. You can configure how Ping of Death attacks should be handled. Table 69: Ping of Death Fields In this field…...
Page 400
Block. Block the attack. This is the default. • None. No action. Track Specify whether to log LAND attacks, by selecting one of the following: • Log. Log the attack. This is the default. • None. Do not log the attack. Check Point UTM-1 Edge User Guide...
Page 401
SmartDefense Categories Non-TCP Flooding Advanced firewalls maintain state information about connections in a State table. In Non- TCP Flooding attacks, the attacker sends high volumes of non-TCP traffic. Since such traffic is connectionless, the related state information cannot be cleared or reset, and the firewall State table is quickly filled up.
Page 402
In this field… Do this… Action Specify what action to take when a DDoS attack occurs, by selecting one of the following: • Block. Block the attack. This is the default. • None. No action. Check Point UTM-1 Edge User Guide...
Page 403
SmartDefense Categories In this field… Do this… Track Specify whether to log DDoS attacks, by selecting one of the following: • Log. Log the attack. This is the default. • None. Do not log the attack. IP and ICMP This category allows you to enable various IP and ICMP protocol tests, and to configure various protections against IP and ICMP-related attacks.
Page 404
Track Specify whether to issue logs for packets that fail the packet sanity tests, by selecting one of the following: • Log. Issue logs. This is the default. • None. Do not issue logs. Check Point UTM-1 Edge User Guide...
Page 405
SmartDefense Categories In this field… Do this… Disable relaxed The UDP length verification sanity check measures the UDP header length UDP length and compares it to the UDP header length specified in the UDP header. If verification the two values differ, the packet may be corrupted. However, since different applications may measure UDP header length differently, the UTM-1 appliance relaxes the UDP length verification sanity check by default, performing the check but not dropping offending packets.
Page 406
Specify whether to log ICMP echo responses that exceed the Max Ping Size Track threshold, by selecting one of the following: • Log. Log the responses. This is the default. • None. Do not log the responses. Check Point UTM-1 Edge User Guide...
Page 407
SmartDefense Categories In this field… Do this… Max Ping Size Specify the maximum data size for ICMP echo response. The default value is 1500. IP Fragments When an IP packet is too big to be transported by a network link, it is split into several smaller IP packets and transmitted in fragments.
Page 408
The default value is 10. Track Specify whether to log fragmented packets, by selecting one of the following: • Log. Log all fragmented packets. • None. Do not log the fragmented packets. This is the default. Check Point UTM-1 Edge User Guide...
Page 409
SmartDefense Categories Network Quota An attacker may try to overload a server in your network by establishing a very large number of connections per second. To protect against Denial Of Service (DoS) attacks, Network Quota enforces a limit upon the number of connections per second that are allowed from the same source IP address.
Page 410
This flood of pings may disrupt network connectivity. You can configure how the Welchia worm should be handled. Check Point UTM-1 Edge User Guide...
Page 411
SmartDefense Categories Table 77: Welchia Fields In this field… Do this… Action Specify what action to take when the Welchia worm is detected, by selecting one of the following: • Block. Block the attack. This is the default. • None. No action. Track Specify whether to log Welchia worm attacks, by selecting one of the following:...
Page 412
IP Mobility - Protocol 55 / • Block. Drop the packet. This is the default. SUN-ND - Protocol 77 / • None. No action. PIM - Protocol 103 Check Point UTM-1 Edge User Guide...
Page 413
SmartDefense Categories Null Payload Some worms, such as Sasser, use ICMP echo request packets with null payload to detect potentially vulnerable hosts. You can configure how null payload ping packets should be handled. Table 79: Null Payload Fields In this field… Do this…...
Page 414
None. No action. Track Specify whether to log packets with incorrect checksums, by selecting one of the following: • Log. Log the packets. • None. Do not log the packets. This is the default. Check Point UTM-1 Edge User Guide...
Page 415
SmartDefense Categories This category allows you to configure various protections related to the TCP protocol. It includes the following: • Flags on page 407 • Sequence Verifier on page 406 • Small PMTU on page 402 • Strict TCP on page 401 •...
Page 416
Each packet has a large overhead that creates a "bottleneck" on the server. You can protect against this attack by specifying a minimum packet size for data sent over the Internet. Check Point UTM-1 Edge User Guide...
Page 417
SmartDefense Categories Table 82: Small PMTU Fields In this field… Do this… Specify what action to take when a packet is smaller than the Minimal MTU Action Size threshold, by selecting one of the following: • Block. Block the packet. •...
Page 418
Specify whether to issue logs for the events specified by the Log Mode Track parameter, by selecting one of the following: • Log. Issue logs. This is the default. • None. Do not issue logs. Check Point UTM-1 Edge User Guide...
Page 419
SmartDefense Categories In this field… Do this… Log Mode Specify upon which events logs should be issued, by selecting one of the following: • None. Do not issue logs. • Log per attack. Issue logs for each SYN attack. This is the default. •...
Page 420
None. No action. This is the default. Track Specify whether to log TCP packets with incorrect sequence numbers, by selecting one of the following: • Log. Log the packets. This is the default. • None. Do not log the packets. Check Point UTM-1 Edge User Guide...
Page 421
SmartDefense Categories Flags The URG flag is used to indicate that there is urgent data in the TCP stream, and that the data should be delivered with high priority. Since handling of the URG flag is inconsistent between different operating systems, an attacker can use the URG flag to conceal certain attacks.
Page 422
• Sweep Scan. The attacker scans various hosts to determine where a specific port is open. You can configure how the UTM-1 appliance should react when a port scan is detected. Check Point UTM-1 Edge User Guide...
Page 423
SmartDefense Categories Table 86: Port Scan Fields In this field… Do this… Number of ports SmartDefense detects ports scans by measuring the number of ports accessed accessed over a period of time. The number of ports accessed must exceed the Number of ports accessed value, within the number of seconds specified by the In a period of [seconds] value, in order for SmartDefense to consider the activity a scan.
Page 424
This category allows you to configure various protections related to the FTP protocol. It includes the following: • Block Known Ports on page 412 • Block Port Overflow on page 413 • Blocked FTP Commands on page 414 • FTP Bounce on page 411 Check Point UTM-1 Edge User Guide...
Page 425
SmartDefense Categories FTP Bounce When connecting to an FTP server, the client sends a PORT command specifying the IP address and port to which the FTP server should connect and send data. An FTP Bounce attack is when an attacker sends a PORT command specifying the IP address of a third party instead of the attacker's own IP address.
Page 426
Specify what action to take when the FTP server attempts to connect to a well-known port, by selecting one of the following: • Block. Block the connection. • None. No action. This is the default. Check Point UTM-1 Edge User Guide...
Page 427
SmartDefense Categories Block Port Overflow FTP clients send PORT commands when connecting to the FTP sever. A PORT command consists of a series of numbers between 0 and 255, separated by commas. To enforce compliance to the FTP standard and prevent potential attacks against the FTP server, you can block PORT commands that contain a number greater than 255.
Page 428
In the Allowed Commands box, select the desired FTP command. Click Block. The FTP command appears in the Blocked Commands box. Click Apply. When FTP command blocking is enabled, the FTP command will be blocked. Check Point UTM-1 Edge User Guide...
Page 429
SmartDefense Categories To allow a specific FTP command In the Blocked Commands box, select the desired FTP command. Click Accept. The FTP command appears in the Allowed Commands box. Click Apply. The FTP command will be allowed, regardless of whether FTP command blocking is enabled or disabled.
Page 430
A worm is a self-replicating malware (malicious software) that propagates by actively sending itself to new machines. Some worms propagate by using security vulnerabilities in the HTTP protocol. You can specify how HTTP-based worm attacks should be handled. Check Point UTM-1 Edge User Guide...
Page 431
SmartDefense Categories Table 91: Worm Catcher Fields In this field… Do this… Action Specify what action to take when an HTTP-based worm attack is detected, by selecting one of the following: • Block. Block the attack. • None. No action. This is the default. Track Specify whether to log HTTP-based worm attacks, by selecting one of the following:...
Page 432
Select the worm patterns to detect. CIFS worm patterns Patterns are matched against file names (including file paths but list excluding the disk share name) that the client is trying to read or write from the server. Check Point UTM-1 Edge User Guide...
Page 433
SmartDefense Categories IGMP This category includes the IGMP protocol. IGMP is used by hosts and routers to dynamically register and discover multicast group membership. Attacks on the IGMP protocol usually target a vulnerability in the multicast routing software/hardware used, by sending specially crafted IGMP packets. You can configure how IGMP attacks should be handled.
Page 434
This category includes the following nodes: • BitTorrent • eMule • Gnutella • KaZaA • Winny Note: SmartDefense can detect peer-to-peer traffic regardless of the TCP port being used to initiate the session. Check Point UTM-1 Edge User Guide...
Page 435
SmartDefense Categories In each node, you can configure how peer-to-peer connections of the selected type should be handled, using the following table. Table 94: Peer to Peer Fields In this field… Do this… Action Specify what action to take when a connection is attempted, by selecting one of the following: •...
Page 436
Instant Messaging Traffic SmartDefense can block instant messaging applications that use VoIP protocols, by identifying the messaging application's fingerprints and HTTP headers. This category includes the following nodes: • • MSN Messenger • Skype • Yahoo Check Point UTM-1 Edge User Guide...
Page 437
SmartDefense Categories Note: SmartDefense can detect instant messaging traffic regardless of the TCP port being used to initiate the session. Note: Skype versions up to 2.0.0.103 are supported. In each node, you can configure how instant messaging connections of the selected type should be handled, using the following table.
Click Security in the main menu, and click the SmartDefense tab. The SmartDefense page appears. Click Reset to Defaults. A confirmation message appears. Click OK. The SmartDefense policy is reset to its default settings. Check Point UTM-1 Edge User Guide...
Overview The UTM-1 appliance includes VStream Antivirus, an embedded stream-based antivirus engine based on Check Point Stateful Inspection and Application Intelligence technologies, that performs virus scanning at the kernel level. VStream Antivirus scans files for malicious content on the fly, without downloading the files into intermediate storage.
Page 440
Note: In protocols that are not listed in this table, VStream Antivirus uses a "best effort" approach to detect viruses. In such cases, detection of viruses is not guaranteed and depends on the specific encoding used by the protocol. Check Point UTM-1 Edge User Guide...
Page 441
Overview If you are subscribed to the VStream Antivirus subscription service, VStream Antivirus virus signatures are automatically updated, so that security is always up-to-date, and your network is always protected. Note: VStream Antivirus differs from the Email Antivirus subscription service (part of the Email Filtering service) in the following ways: •...
To enable/disable VStream Antivirus Click Antivirus in the main menu, and click the Antivirus tab. The VStream Antivirus page appears. Drag the On/Off lever upwards or downwards. VStream Antivirus is enabled/disabled for all internal network computers. Check Point UTM-1 Edge User Guide...
Viewing VStream Antivirus Signature Database Information Viewing VStream Antivirus Signature Database Information VStream Antivirus maintains two databases: a daily database and a main database. The daily database is updated frequently with the newest virus signatures. Periodically, the contents of the daily database are moved to the main database, leaving the daily database empty.
VStream Antivirus processes policy rules in the order they appear in the Antivirus Policy table, so that rule 1 is applied before rule 2, and so on. This enables you to define exceptions to rules, by placing the exceptions higher up in the Rules table. Check Point UTM-1 Edge User Guide...
Page 445
Configuring VStream Antivirus For example, if you want to scan all outgoing SMTP traffic, except traffic from a specific IP address, you can create a rule scanning all outgoing SMTP traffic and move the rule down in the Antivirus Policy table. Then create a rule passing SMTP traffic from the desired IP address and move this rule to a higher location in the Antivirus Policy table than the first rule.
Page 446
If a virus is found, it is blocked and logged. Adding and Editing VStream Antivirus Rules To add or edit a VStream Antivirus rule Click Antivirus in the main menu, and click the Policy tab. The Antivirus Policy page appears. Check Point UTM-1 Edge User Guide...
Page 447
Configuring VStream Antivirus Do one of the following: • To add a new rule, click Add Rule. • To edit an existing rule, click the Edit icon next to the desired rule. The VStream Policy Rule Wizard opens, with the Step 1: Rule Type dialog box displayed.
Page 448
The example below shows a Scan rule. Complete the fields using the relevant information in the following table. Click Next. The Step 3: Destination & Source dialog box appears. To configure advanced settings, click Show Advanced Settings. Check Point UTM-1 Edge User Guide...
Page 449
Configuring VStream Antivirus New fields appear. Complete the fields using the relevant information in the following table. Click Next. The Step 4: Done dialog box appears. 10. If desired, type a description of the rule in the field provided. Chapter 14: Using VStream Antivirus...
Page 450
To specify an IP address, select Specified IP and type the desired IP address source is in the field provided. To specify an IP address range, select Specified Range and type the desired IP address range in the fields provided. Check Point UTM-1 Edge User Guide...
Page 451
Configuring VStream Antivirus In this field… Do this… And the Select the destination of the connections you want to allow or block. destination is To specify an IP address, select Specified IP and type the desired IP address in the text box. To specify an IP address range, select Specified Range and type the desired IP address range in the fields provided.
Page 452
Click next to the desired rule, to move the rule up in the table. • Click next to the desired rule, to move the rule down in the table. The rule's priority changes accordingly. Check Point UTM-1 Edge User Guide...
Page 453
Configuring VStream Antivirus Viewing and Deleting VStream Antivirus Rules To view or delete an existing VStream Antivirus rule Click Antivirus in the main menu, and click the Policy tab. The Antivirus Policy page appears with a list of existing VStream Antivirus rules. To view a rule's description, mouse-over the information icon in the desired rule's row.
Page 454
To restore the default VStream Antivirus settings, do the following: a) Click Default. A confirmation message appears. b) Click OK. The VStream Antivirus settings are reset to their defaults. For information on the default values, refer to the following table. Check Point UTM-1 Edge User Guide...
Page 455
Configuring VStream Antivirus Table 100: Advanced Antivirus Settings Fields In this field… Do this… File Types Block potentially unsafe Select this option to block all emails containing potentially unsafe file types in email attachments. messages Unsafe file types are: • DOS/Windows executables, libraries and drivers •...
Page 456
To view a list of safe file types, click Show next to this option. Selecting this option reduces the load on the gateway by skipping safe file types. This option is selected by default. Check Point UTM-1 Edge User Guide...
Page 457
Configuring VStream Antivirus In this field… Do this… Archive File Handling Maximum Nesting Level Type the maximum number of nested content levels that VStream Antivirus should scan. Setting a higher number increases security. Setting a lower number prevents attackers from overloading the gateway by sending extremely nested archive files.
To update the VStream Antivirus virus signature database Click Antivirus in the main menu, and click the Antivirus tab. The VStream Antivirus page appears. Click Update Now. The VStream Antivirus database is updated with the latest virus signatures. Check Point UTM-1 Edge User Guide...
The UTM-1 appliance can connect to the following types of Service Centers: • Check Point's Security Management Architecture (SMART) SMART management allows deploying and centrally managing a single security policy on an unlimited number of UTM-1 appliances. Connecting to SMART management is therefore recommended for enterprises.
Connecting to a Service Center Connecting to a Service Center To connect to a Service Center Click Services in the main menu, and click the Account tab. The Account page appears. Check Point UTM-1 Edge User Guide...
Page 461
Connecting to a Service Center In the Service Account area, click Connect. The UTM-1 Services Wizard opens, with the Service Center dialog box displayed. Make sure the Connect to a Service Center check box is selected. Do one of the following: •...
Page 462
If the Service Center requires authentication, the Service Center Login dialog box appears. Enter your gateway ID and registration key in the appropriate fields, as given to you by your service provider, then click Next. • The Connecting screen appears. Check Point UTM-1 Edge User Guide...
Page 463
Connecting to a Service Center • The Confirmation dialog box appears with a list of services to which you are subscribed. Click Next. The Done screen appears with a success message. Click Finish. The following things happen: Chapter 15: SMART Management and Subscription Services...
Page 464
The services to which you are subscribed are now available on your UTM-1 appliance and listed as such on the Account page. See Viewing Services Information on page 451 for further information. • The Services submenu includes the services to which you are subscribed. Check Point UTM-1 Edge User Guide...
Viewing Services Information Viewing Services Information The Account page displays the following information about your subscription. Table 101: Account Page Fields This field… Displays… Service Center The name of the Service Center to which you are connected (if known). Name Gateway ID Your gateway ID.
Click Services in the main menu, and click the Account tab. The Account page appears. In the Service Account area, click Refresh. The UTM-1 appliance reconnects to the Service Center. Your service settings are refreshed. Check Point UTM-1 Edge User Guide...
Configuring Your Account Configuring Your Account This option allows you to access your Service Center's Web site, which may offer additional configuration options for your account. Contact your Service Center for a user ID and password. To configure your account Click Services in the main menu, and click the Account tab.
For information on configuring network objects, see Using Network Objects on page 188. Note: The Web Filtering service is only available if you are connected to a Service Center and subscribed to this service. Check Point UTM-1 Edge User Guide...
Page 469
Web Filtering Note: The Web Filtering subscription service differs from Web rules in the following ways: • The category-based Web Filtering service is subscription-based and requires a connection to the Service Center, while Web rules are included with the UTM-1 appliance. •...
Page 470
Web Filtering The Web Filtering page appears. Drag the On/Off lever upwards or downwards. Web Filtering is enabled/disabled. Check Point UTM-1 Edge User Guide...
Page 471
Web Filtering Selecting Categories for Blocking You can define which types of Web sites should be considered appropriate for your family or office members, by selecting the categories. Categories marked with will remain visible, while categories marked with will be blocked and will require the administrator password for viewing.
Page 472
To temporarily allow all connections to the Internet, click This ensures continuous access to the Internet. The button changes to When the Service Center is available again, the gateway will enforce the configured Web Filtering policy. Check Point UTM-1 Edge User Guide...
Page 473
Web Filtering Temporarily Disabling Web Filtering If desired, you can temporarily disable the Web Filtering service. To temporarily disable Web Filtering Click Services in the main menu, and click the Web Filtering tab. The Web Filtering page appears. Click Snooze. •...
Page 474
The service is re-enabled for all internal network computers. • If you clicked Resume in the Web Filtering page, the button changes to Snooze. • If you clicked Resume in the Web Filtering Off popup window, the popup window closes. Check Point UTM-1 Edge User Guide...
Email Filtering Email Filtering There are two Email Filtering services: • Email Antivirus When the Email Antivirus service is enabled, your email is automatically scanned for the detection and elimination of all known viruses and vandals. If a virus is detected, it is removed and replaced with a warning message.
Page 476
To enable/disable Email Filtering Click Services in the main menu, and click the Email Filtering tab. The Email Filtering page appears. Next to Email Antivirus, drag the On/Off lever upwards or downwards. Email Antivirus is enabled/disabled. Check Point UTM-1 Edge User Guide...
Page 477
Email Filtering Selecting Protocols for Scanning If you are locally managed, you can define which protocols should be scanned for viruses and spam: • Email retrieving (POP3). If enabled, all incoming email in the POP3 protocol will be scanned. • Email sending (SMTP).
Page 478
This ensures continuous access to email; however, it does not protect against viruses and spam, so use this option cautiously. The button changes to When the Service Center is available again, the gateway will enforce the configured Email Filtering policy. Check Point UTM-1 Edge User Guide...
Page 479
Email Filtering Temporarily Disabling Email Filtering If you are having problems sending or receiving email you can temporarily disable the Email Filtering services. To temporarily disable Email Filtering Click Services in the main menu, and click the Email Filtering tab. The Email Filtering page appears.
To configure software updates when locally managed Click Services in the main menu, and click the Software Updates tab. Check Point UTM-1 Edge User Guide...
Page 481
Automatic and Manual Updates The Software Updates page appears. To set the UTM-1 appliance to automatically check for and install new software updates, drag the Automatic/Manual lever upwards. The UTM-1 appliance checks for new updates and installs them according to its schedule.
Page 482
To manually check for security and software updates Click Services in the main menu, and click the Software Updates tab. The Software Updates page appears. Click Update Now. The system checks for new updates and installs them. Check Point UTM-1 Edge User Guide...
UTM-1 gateways. To connect an appliance to a Check Point SMART management server, you must connect the appliance to the Service Center using the Services page Connect tab.
• SecuRemote Remote Access VPN Server. Makes a network remotely available to authorized users who connect to the Remote Access VPN Server using the Check Point SecuRemote VPN Client (provided for free with your UTM-1) or another UTM-1. • SecuRemote Internal VPN Server. SecuRemote can also be used from your internal networks, allowing you to secure your wired or wireless network with strong encryption and authentication.
Page 485
Note: A locally managed VPN Server or gateway must have a static IP address. If you need a VPN Server or gateway with a dynamic IP address, you must use either Check Point SMART management or SofaWare Security Management Portal (SMP) management.
Page 486
The connected networks function as a single network. You can use this type of VPN to mesh office branches into one corporate network. Figure 29: Site-to-Site VPN Check Point UTM-1 Edge User Guide...
Page 487
Overview To create a Site-to-Site VPN with two VPN sites On the first VPN site’s UTM-1 appliance, do the following: Define the second VPN site as a Site-to-Site VPN Gateway, using the procedure Adding and Editing VPN Sites on page Error! Bookmark not defined..
Page 488
Remote Access VPN Server with their Remote Access VPN Clients. Figure 30: Remote Access VPN Check Point UTM-1 Edge User Guide...
Page 489
Overview To create a Remote Access VPN with two VPN sites On the remote user VPN site's UTM-1 appliance, add the office Remote Access VPN Server as a Remote Access VPN site. See Adding and Editing VPN Sites on page Error! Bookmark not defined.. The remote user's UTM-1 appliance will act as a Remote Access VPN Client.
When the SecuRemote Remote Access VPN Server or SecuRemote Internal VPN Server is enabled, users can connect to the server via Check Point SecuRemote/SecureClient or via a UTM-1 appliance in Remote Access VPN mode. When the L2TP (Layer 2 Tunneling Protocol) VPN Server is enabled, users can connect to the server using an L2TP client such as the Microsoft Windows L2TP IPSEC VPN Client.
Page 491
Setting Up Your UTM-1 Appliance as a VPN Server To set up your UTM-1 appliance as a VPN Server Configure the VPN Server in one or more of the following ways: • To accept SecuRemote/SecureClient or UTM-1 remote access connections from the Internet.
Page 492
To configure the SecuRemote Remote Access VPN Server Click VPN in the main menu, and click the VPN Server tab. The VPN Server page appears. Select the Allow SecuRemote users to connect from the Internet check box. Check Point UTM-1 Edge User Guide...
Page 493
Setting Up Your UTM-1 Appliance as a VPN Server New check boxes appear. To allow authenticated users connecting from the Internet to bypass NAT when connecting to your internal network, select the Bypass NAT check box. To allow authenticated users connecting from the Internet to bypass the default firewall policy and access your internal network without restriction, select the Bypass default firewall policy check box.
Page 494
To allow authenticated users connecting from internal networks to bypass the default firewall policy and access your internal network without restriction, select the Bypass default firewall policy check box. User-defined rules will still apply to the authenticated users. Check Point UTM-1 Edge User Guide...
Page 495
Setting Up Your UTM-1 Appliance as a VPN Server Note: Bypass NAT is always enabled for the internal VPN Server, and cannot be disabled. Click Apply. The internal VPN Server is enabled for the specified connection types. Configuring the L2TP VPN Server To configure the L2TP VPN Server Click VPN in the main menu, and click the VPN Server tab.
Page 496
Follow the online instructions to complete installation. SecureClient/SecuRemote is installed. For information on using SecureClient/SecuRemote, see the User Help. To access SecureClient/SecuRemote User Help, right-click on the VPN Client icon in the taskbar, select Settings, and then click Help. Check Point UTM-1 Edge User Guide...
Page 497
Setting Up Your UTM-1 Appliance as a VPN Server Configuring L2TP VPN Clients If you configured the L2TP VPN Server, you must configure the L2TP VPN Client on all computers that should be allowed to remotely access your network via L2TP connections. This procedure is relevant for computers with a Windows XP operating system.
Page 498
Setting Up Your UTM-1 Appliance as a VPN Server The Network Connection Type dialog box appears. Choose Connect to the network at my workplace. Click Next. The Network Connection dialog box appears. Choose Virtual Private Network connection. Click Next. Check Point UTM-1 Edge User Guide...
Page 499
Setting Up Your UTM-1 Appliance as a VPN Server The Connection Name dialog box appears. 10. In the Company Name field, type your company's name. 11. Click Next. The Public Network dialog box appears. 12. Choose Do not dial the initial connection. 13.
Page 500
The Completing the New Connection Wizard screen appears. 15. Click Finish. 16. In the Network and Dial-up Connections window, right-click on the L2TP connection, and click Properties in the popup menu. The connection's Properties dialog box opens. Check Point UTM-1 Edge User Guide...
Page 501
Setting Up Your UTM-1 Appliance as a VPN Server 17. In the Security tab, choose Advanced (custom settings). 18. Click Settings. The Advanced Security Settings dialog box opens. 19. In the Data encryption drop-down list, select Optional encryption. 20. Choose Allow these protocols. 21.
Page 502
25. In the Key field, type the preshared secret you configured on the L2TP VPN Server. 26. Click OK. 27. In Properties dialog box, click the Networking tab. 28. In the Type of VPN drop-down list, select L2TP IPSec VPN. 29. Click OK. Check Point UTM-1 Edge User Guide...
Adding and Editing VPN Sites Adding and Editing VPN Sites To add or edit VPN sites Click VPN in the main menu, and click the VPN Sites tab. The VPN Sites page appears with a list of VPN sites. Do one of the following: •...
Page 504
Select Remote Access VPN to establish remote access from your Remote Access VPN Client to a Remote Access VPN Server. • Select Site-to-Site VPN to create a permanent bi-directional connection to another Site-to-Site VPN Gateway. Click Next. Check Point UTM-1 Edge User Guide...
Page 505
Adding and Editing VPN Sites Configuring a Remote Access VPN Site If you selected Remote Access VPN, the VPN Gateway Address dialog box appears. Enter the IP address of the Remote Access VPN Server to which you want to connect, as given to you by the network administrator. To allow the VPN site to bypass the default firewall policy and access your internal network without restriction, select the Bypass default firewall policy check box.
Page 506
Adding and Editing VPN Sites The VPN Network Configuration dialog box appears. Specify how you want to obtain the VPN network configuration. Refer to VPN Network Configuration Fields on page 501. Click Next. Check Point UTM-1 Edge User Guide...
Page 507
Adding and Editing VPN Sites The following things happen in the order below: • If you chose Specify Configuration, a second VPN Network Configuration dialog box appears. Complete the fields using the information in VPN Network Configuration Fields on page 501 and click Next. Chapter 16: Working with VPNs...
Page 508
In the Backup Gateway IP field, type the name of the VPN site to use if the primary VPN site fails, and then click Next. • The Authentication Method dialog box appears. Check Point UTM-1 Edge User Guide...
Page 509
Adding and Editing VPN Sites Complete the fields using the information in Authentication Methods Fields on page 503. Click Next. Username and Password Authentication Method If you selected Username and Password, the VPN Login dialog box appears. Complete the fields using the information in VPN Login Fields on page 504. Click Next.
Page 510
Warning: If you try to connect to the VPN site before completing the wizard, all existing tunnels to this site will be terminated. 2) Click Next. If you selected Try to Connect to the VPN Gateway, the Connecting… screen appears, and then the Contacting VPN Site screen appears. Check Point UTM-1 Edge User Guide...
Page 511
Adding and Editing VPN Sites • The Site Name dialog box appears. Enter a name for the VPN site. You may choose any name. Click Next. The VPN Site Created screen appears. Chapter 16: Working with VPNs...
Page 512
Warning: If you try to connect to the VPN site before completing the wizard, all existing tunnels to this site will be terminated. Click Next. If you selected Try to Connect to the VPN Gateway, the Connecting… screen appears, and then the Contacting VPN Site screen appears. Check Point UTM-1 Edge User Guide...
Page 513
Adding and Editing VPN Sites The Site Name dialog box appears. Enter a name for the VPN site. You may choose any name. Click Next. The VPN Site Created screen appears. Chapter 16: Working with VPNs...
Page 514
VPN Sites list. If you edited a VPN site, the modifications are reflected in the VPN Sites list. RSA SecurID Authentication Method If you selected RSA SecurID, the Site Name dialog box appears. Enter a name for the VPN site. You may choose any name. Click Next. Check Point UTM-1 Edge User Guide...
Page 515
Remote Access VPN Server. Note: Downloading the network configuration is only possible if you are connecting to a Check Point VPN-1 or UTM-1 Site-to-Site VPN Gateway. Specify Click this option to provide the network configuration manually.
Page 516
OSPF, refer to the Embedded NGX CLI Reference Guide. This option is only available for when configuring a Site-to-Site VPN gateway. Destination network Type up to three destination network addresses at the VPN site to which you want to connect. Check Point UTM-1 Edge User Guide...
Page 517
Adding and Editing VPN Sites In this field… Do this… Subnet mask Select the subnet masks for the destination network addresses. Note: Obtain the destination networks and subnet masks from the VPN site’s system administrator. Table 103: Authentication Methods Fields In this field…...
Page 518
Manual Login, see Logging on to a VPN Site on page 524. Username Type the user name to be used for logging on to the VPN site. Password Type the password to be used for logging on to the VPN site. Check Point UTM-1 Edge User Guide...
Page 519
Adding and Editing VPN Sites Configuring a Site-to-Site VPN Gateway If you selected Site-to-Site VPN, the VPN Gateway Address dialog box appears. Complete the fields using the information in VPN Gateway Address Fields on page 519. Click Next. Chapter 16: Working with VPNs...
Page 520
Specify how you want to obtain the VPN network configuration. Refer to VPN Network Configuration Fields on page 501. Click Next. • If you chose Specify Configuration, a second VPN Network Configuration dialog box appears. Check Point UTM-1 Edge User Guide...
Page 521
Adding and Editing VPN Sites Complete the fields using the information in VPN Network Configuration Fields on page 501, and then click Next. • If you chose Specify Configuration or Route All Traffic, the Backup Gateway dialog box appears. In the Backup Gateway IP field, type the name of the VPN site to use if the primary VPN site fails, and then click Next.
Page 522
Complete the fields using the information in Route Based VPN Fields on page 519, and then click Next. • The Authentication Method dialog box appears. Complete the fields using the information in Authentication Methods Fields on page 520. Check Point UTM-1 Edge User Guide...
Page 523
Adding and Editing VPN Sites Click Next. Shared Secret Authentication Method If you selected Shared Secret, the Authentication dialog box appears. If you chose Download Configuration, the dialog box contains additional fields. Chapter 16: Working with VPNs...
Page 524
Complete the fields using the information in VPN Authentication Fields on page 520 and click Next. The Security Methods dialog box appears. To configure advanced security settings, click Show Advanced Settings. New fields appear. Check Point UTM-1 Edge User Guide...
Page 525
Adding and Editing VPN Sites Complete the fields using the information in Security Methods Fields on page 521 and click Next. The Connect dialog box appears. To try to connect to the Remote Access VPN Server, select the Try to Connect to the VPN Gateway check box.
Page 526
You may choose any name. To keep the tunnel to the VPN site alive even if there is no network traffic between the UTM-1 appliance and the VPN site, select Keep this site alive. Click Next. Check Point UTM-1 Edge User Guide...
Page 527
Adding and Editing VPN Sites • If you selected Keep this site alive, and previously you chose Download Configuration, the "Keep Alive" Configuration dialog box appears. Do the following: 1) Type up to three IP addresses which the UTM-1 appliance should ping in order to keep the tunnel to the VPN site alive.
Page 528
If you selected Certificate, the following things happen: • If you chose Download Configuration, the Authentication dialog box appears. Complete the fields using the information in VPN Authentication Fields on page 520 and click Next. Check Point UTM-1 Edge User Guide...
Page 529
Adding and Editing VPN Sites • The Security Methods dialog box appears. To configure advanced security settings, click Show Advanced Settings. New fields appear. Complete the fields using the information in Security Methods Fields on page 521 and click Next. Chapter 16: Working with VPNs...
Page 530
Click Next. • If you selected Try to Connect to the VPN Gateway, the following things happen: The Connecting… screen appears. • The Contacting VPN Site screen appears. Check Point UTM-1 Edge User Guide...
Page 531
Adding and Editing VPN Sites • The Site Name dialog box appears. Enter a name for the VPN site. You may choose any name. To keep the tunnel to the VPN site alive even if there is no network traffic between the UTM-1 appliance and the VPN site, select Keep this site alive.
Page 532
The VPN Sites page reappears. If you added a VPN site, the new site appears in the VPN Sites list. If you edited a VPN site, the modifications are reflected in the VPN Sites list. Check Point UTM-1 Edge User Guide...
Page 533
Adding and Editing VPN Sites Table 105: VPN Gateway Address Fields In this field… Do this… Gateway Address Type the IP address of the Site-to-Site VPN Gateway to which you want to connect, as given to you by the network administrator. Bypass NAT Select this option to allow the VPN site to bypass NAT when connecting to your internal network.
Page 534
Type the shared secret to use for secure communications with the VPN Secret site. This shared secret is a string used to identify the VPN sites to each other. The secret can contain spaces and special characters. Check Point UTM-1 Edge User Guide...
Page 535
Adding and Editing VPN Sites Table 109: Security Methods Fields In this field… Do this… Phase 1 Security Methods Select the encryption and integrity algorithm to use for IKE negotiations: • Automatic. The UTM-1 appliance automatically selects the best security methods supported by the site. This is the default. •...
Page 536
A group with more bits ensures a stronger key but lowers performance. Renegotiate every Type the interval in seconds between IPSec SA key negotiations. This is the IKE Phase-2 SA lifetime. A shorter interval ensures higher security. The default value is 3600 seconds (one hour). Check Point UTM-1 Edge User Guide...
Viewing and Deleting VPN Sites Viewing and Deleting VPN Sites To view or delete a VPN site Click VPN in the main menu, and click the VPN Sites tab. The VPN Sites page appears, with a list of all VPN sites. To delete a VPN site, do the following.
VPN site from those computers, using the same user name and password. Note: You must use a single user name and password for each VPN destination gateway. Check Point UTM-1 Edge User Guide...
Page 539
Logging on to a Remote Access VPN Site Logging on through the UTM-1 Portal Note: You can only log on to sites that are configured for Manual Login. To manually log on to a VPN site through the UTM-1 Portal Click VPN in the main menu, and click the VPN Sites tab.
Page 540
If the UTM-1 appliance is configured to automatically download the network configuration, the UTM-1 appliance downloads the network configuration. • If when adding the VPN site you specified a network configuration, the UTM- 1 appliance attempts to create a tunnel to the VPN site. Check Point UTM-1 Edge User Guide...
Logging off a Remote Access VPN Site • The VPN Login Status box appears. The Status field tracks the connection’s progress. • Once the UTM-1 appliance has finished connecting, the Status field changes to “Connected”. • The VPN Login Status box remains open until you manually log off of the VPN site.
Do not use the same certificate for more than one gateway. Note: When the firewall is managed by SmartCenter, it automatically downloads a certificate from SmartCenter, and therefore there is no need to install one. Check Point UTM-1 Edge User Guide...
Page 543
Installing a Certificate Generating a Self-Signed Certificate To generate a self-signed certificate Click VPN in the main menu, and click the Certificate tab. The Certificate page appears. Click Install Certificate. Chapter 16: Working with VPNs...
Page 544
The UTM-1 Certificate Wizard opens, with the Certificate Wizard dialog box displayed. Click Generate a self-signed security certificate for this gateway. The Create Self-Signed Certificate dialog box appears. Complete the fields using the information in the following table. Click Next. Check Point UTM-1 Edge User Guide...
Page 545
Installing a Certificate The UTM-1 appliance generates the certificate. This may take a few seconds. The Done dialog box appears, displaying the certificate's details. Click Finish. The UTM-1 appliance installs the certificate. If a certificate is already installed, it is overwritten.
Page 546
Installing a Certificate • The starting and ending dates between which the gateway's certificate and the CA's certificate are valid Check Point UTM-1 Edge User Guide...
Page 547
Installing a Certificate Table 110: Certificate Fields In this field… Do this… Country Select your country from the drop-down list. Organization Type the name of your organization. Name Organizational Unit Type the name of your division. Gateway Name Type the gateway's name. This name will appear on the certificate, and will be visible to remote users inspecting the certificate.
Page 548
Click Browse to open a file browser from which to locate and select the file. The filename that you selected is displayed. Click Next. The Import-Certificate Passphrase dialog box appears. This may take a few moments. Check Point UTM-1 Edge User Guide...
Page 549
Installing a Certificate Type the pass-phrase you received from the network security administrator. Click Next. The Done dialog box appears, displaying the certificate's details. Click Finish. The UTM-1 appliance installs the certificate. If a certificate is already installed, it is overwritten.
Click VPN in the main menu, and click the Certificate tab. The Certificate page appears with the name of the currently installed certificate. Click Uninstall. A confirmation message appears. Click OK. The certificate is uninstalled. A success message appears. Click OK. Check Point UTM-1 Edge User Guide...
Viewing VPN Tunnels Viewing VPN Tunnels You can view a list of currently established VPN tunnels. VPN tunnels are created and closed as follows: • Remote Access VPN sites configured for Automatic Login and Site-to-Site VPN Gateways A tunnel is created whenever your computer attempts any kind of communication with a computer at the VPN site.
Page 552
The encryption and authentication schemes used for the connection are the strongest of those used at the two sites. Your UTM-1 appliance supports AES, 3DES, and DES encryption schemes, and MD5 and SHA authentication schemes. Check Point UTM-1 Edge User Guide...
Page 553
Viewing VPN Tunnels This field… Displays… Established The time at which the tunnel was established. This information is presented in the format hh:mm:ss, where: hh=hours mm=minutes ss=seconds Table 112: VPN Tunnels Icons This icon… Represents… This gateway A network for which an IKE Phase-2 tunnel was negotiated A Remote Access VPN Server A Site-to-Site VPN Gateway A remote access VPN user...
Click Reports in the main menu, and click the Tunnels tab. The VPN Tunnels page appears with a table of open tunnels to VPN sites. Click Save IKE Trace. A standard File Download dialog box appears. Click Save. Check Point UTM-1 Edge User Guide...
Viewing VPN Topology The Save As dialog box appears. Browse to a destination directory of your choice. Type a name for the *.elg file and click Save. The *.elg file is created and saved to the specified directory. This file contains the IKE traces of all currently-established VPN tunnels.
Changing Your Login Credentials Chapter 17 Managing Users This chapter describes how to manage UTM-1 appliance users. You can define multiple users, set their passwords, and assign them various permissions. This chapter includes the following topics: Changing Your Login Credentials............543 Adding and Editing Users ................546 Adding Quick Guest HotSpot Users............550 Viewing and Deleting Users..............552...
Page 558
Changing Your Login Credentials The Internal Users page appears. In the row of your username, click Edit. The Account Wizard opens displaying the Set User Details dialog box. Edit the Username field. Check Point UTM-1 Edge User Guide...
Page 559
Changing Your Login Credentials Edit the Password and Confirm password fields. Note: Use 5 to 25 characters (letters or numbers) for the new password. Click Next. The Set User Permissions dialog box appears. Click Finish. Your changes are saved. Chapter 17: Managing Users...
To edit an existing user, click Edit next to the desired user. The Account Wizard opens displaying the Set User Details dialog box. Complete the fields using the information in Set User Details Fields on page 547. Click Next. Check Point UTM-1 Edge User Guide...
Page 561
Adding and Editing Users The Set User Permissions dialog box appears. The options that appear on the page are dependant on the software and services you are using. Complete the fields using the information in Set User Permissions Fields on page 548.
Page 562
HotSpot users. • Read/Write: The user can log on to the UTM-1 Portal and modify system settings. The default level is No Access. The “admin” user’s Administrator Level (Read/Write) cannot be changed. Check Point UTM-1 Edge User Guide...
Page 563
Adding and Editing Users VPN Remote Select this option to allow the user to connect to this UTM-1 appliance Access using their VPN client. For further information on setting up VPN remote access, see see Setting Up Remote VPN Access for Users on page 553 Web Filtering Select this option to allow the user to override the Web Filtering service Override...
For information on changing the default expiration period, refer to the Embedded NGX CLI Reference Guide. To quickly create a guest user Click Users in the main menu, and click the Internal Users tab. The Internal Users page appears. Click Quick Guest. Check Point UTM-1 Edge User Guide...
Page 565
Adding Quick Guest HotSpot Users The Account Wizard opens displaying the Save Quick Guest dialog box. In the Expires field, click on the arrows to specify the expiration date and time. To print the user details, click Print. Click Finish. The guest user is saved.
A confirmation message appears. b) Click OK. The user is deleted. To delete all expired users, do the following: a) Click Clear Expired. A confirmation message appears. b) Click OK. The expired users are deleted. Check Point UTM-1 Edge User Guide...
VPN Server, or as an L2TP VPN Server, you can allow users to access it remotely through their Remote Access VPN Clients (a Check Point SecureClient, Check Point SecuRemote, an L2TP VPN Client, or another Embedded NGX appliance).
Page 568
HotSpot session timeout value. When the RADIUS server's Session-Timeout Attribute is configured, HotSpot users will be logged off after the specified session timeout has elapsed. To use RADIUS authentication Click Users in the main menu, and click the RADIUS tab. Check Point UTM-1 Edge User Guide...
Page 569
Using RADIUS Authentication The RADIUS page appears. Complete the fields using the following table. Click Apply. To restore the default RADIUS settings, do the following: a) Click Default. A confirmation message appears. b) Click OK. The RADIUS settings are reset to their defaults. For information on the default values, refer to the following table.
Page 570
To clear the text box, click Clear. Port Type the port number on the RADIUS server’s host computer. The default port number is 1812. Shared Secret Type the shared secret to use for secure communication with the RADIUS server. Check Point UTM-1 Edge User Guide...
Page 571
Using RADIUS Authentication In this field… Do this… Realm If your organization uses RADIUS realms, type the realm to append to RADIUS requests. The realm will be appended to the username as follows: <username>@<realm> For example, if you set the realm to “myrealm”, and the user "JohnS" attempts to log on to the UTM-1 Portal, the UTM-1 appliance will send the RADIUS server an authentication request with the username “JohnS@myrealm”.
Page 572
Up Remote VPN Access for Users on page 553. Web Filtering Select this option to allow all users authenticated by the RADIUS server Override to override Web Filtering. This option only appears if the Web Filtering service is defined. Check Point UTM-1 Edge User Guide...
Page 573
Using RADIUS Authentication In this field… Do this… HotSpot Access Select this option to allow all users authenticated by the RADIUS server to access the My HotSpot page. For information on Secure HotSpot, see Configuring Secure HotSpot on page 351. Remote Desktop Select this option to allow all users authenticated by the RADIUS server to log on to the my.firewall portal, view the Active Computers...
For example, to assign the user VPN access permissions, set attribute number 2 to “true”. Assign the policy to the desired user or user group. For detailed instructions and examples, refer to the "Configuring the RADIUS Vendor- Specific Attribute" white paper. Check Point UTM-1 Edge User Guide...
Page 575
Configuring RADIUS Attributes Table 116: VSA Syntax Permission Description Attribute Attribute Attribute Values Notes Number Format none. The user Admin Indicates the String administrator’s cannot access the level of access to UTM-1 Portal. the UTM-1 Portal readonly. The user can log on to the UTM-1 Portal, but cannot modify system settings.
Page 576
The user can Indicates whether String This permission is the user can override Web only relevant if override Web Filtering. the Web Filtering Filtering. service is false. The user enabled. cannot override Web Filtering. Check Point UTM-1 Edge User Guide...
Page 577
Configuring RADIUS Attributes Permission Description Attribute Attribute Attribute Values Notes Number Format true. The user can RemoteDe Indicates whether String This permission is sktop the user can log on to the only relevant if remotely access my.firewall portal, the Remote view the Active computers' Desktop feature is...
Overview Chapter 18 Using Remote Desktop This chapter describes how to remotely access the desktop of each of your computers, using the UTM-1 appliance's Remote Desktop feature. This chapter includes the following topics: Overview ....................565 Workflow....................566 Configuring Remote Desktop..............567 Configuring the Host Computer ...............570 Accessing a Remote Computer's Desktop ..........573 Overview Your UTM-1 appliance includes an integrated client for Microsoft Terminal Services,...
Grant Remote Desktop Access permissions to users who should be allowed to remotely access desktops. See Adding and Editing Users on page 546. The authorized users can access remote computers' desktops as desired. See Accessing a Remote Computer's Desktop on page 573. Check Point UTM-1 Edge User Guide...
Configuring Remote Desktop Configuring Remote Desktop To configure Remote Desktop Click Setup in the main menu, and click the Remote Desktop tab. The Remote Desktop page appears. Do one of the following: • To enable Remote Desktop, select the Allow remote desktop access check box.
Page 582
Share local printers Select this option to allow the host computer to access printers on the client computer. This enables remote users to access their local printer when logged on to the host computer. Check Point UTM-1 Edge User Guide...
Page 583
Configuring Remote Desktop In this field… Do this… Share local Select this option to allow the host computer to access smartcards on smartcards the client computer. This enables remote users to access their local smartcards when logged on to the host computer. Share local COM Select this option to allow the host computer to access COM ports on ports...
For information, refer to Microsoft documentation. On the desktop, right-click on My Computer, and select Properties in the pop- up menu that appears. The System Properties dialog box appears displaying the General tab. Click the Remote tab. Check Point UTM-1 Edge User Guide...
Page 585
Configuring the Host Computer The Remote tab appears. Select the Allow users to connect remotely to this computer check box. Click Select Remote Users. The Remote Desktop Users dialog box appears. Do the following for each remote user who should be allowed to access this computer: Click Add.
Page 586
Type the desired user's username in the text box. The Check Names button is enabled. Click Check Names. Click OK. The Remote Desktop Users dialog box reappears with the desired user's username. Click OK. Click OK. Check Point UTM-1 Edge User Guide...
Accessing a Remote Computer's Desktop Accessing a Remote Computer's Desktop Note: The client computer must meet the following requirements: • Microsoft Internet Explorer 6.0 or later • A working Internet connection To access a remote computer's desktop Click Reports in the main menu, and click the My Computers tab. The My Computers page appears.
Page 588
These are the credentials configured for your user account in Enabling the Remote Desktop Server on page 570. Click OK. The remote computer's desktop appears onscreen. You can use the following keyboard shortcuts during the Remote Desktop session: Check Point UTM-1 Edge User Guide...
Page 589
Accessing a Remote Computer's Desktop Table 118: Remote Desktop Keyboard Shortcuts This shortcut… Does this… ALT+INSERT Cycles through running programs in the order that they were started Displays the Start menu ALT+HOME CTRL+ALT+BREAK Toggles between displaying the session in a window and on the full screen Opens the Windows Security dialog box CTRL+ALT+END...
Accessing a Remote Computer's Desktop Chapter 19 Maintenance This chapter describes the tasks required for maintenance and diagnosis of your UTM-1 appliance. This chapter includes the following topics: Viewing Firmware Status .................578 Updating the Firmware................580 Upgrading Your License ................582 Configuring Syslog Logging ..............584 Controlling the Appliance via the Command Line ........586 Configuring HTTPS .................592 Configuring SSH ..................595...
You can view your current firmware version and additional details. To view the firmware status • Click Setup in the main menu, and click the Firmware tab. The Firmware page appears. The Firmware page displays the following information: Check Point UTM-1 Edge User Guide...
Page 593
00:80:11:22:33:44 the Internet connection Firmware Version The current version of the firmware Installed Product The licensed software and UTM-1 Edge X (unlimited nodes) the number of allowed nodes Uptime The time that elapsed from 01:21:15 the moment the unit was...
Connecting to a Service Center on page 446. When connected to SmartCenter, you can also update UTM-1 firmware using SmartCenter's SmartUpdate.component. For information refer to the Check Point SmartUpdate documentation. If you are not subscribed to the Software Updates service, you must update your firmware manually.
Page 595
Updating the Firmware The Firmware Update page appears. Click Browse. A browse window appears. Select the image file and click Open. The Firmware Update page reappears. The path to the firmware update image file appears in the Browse text box. Click Upload.
UTM-1 appliance you have today. There is no need to replace your hardware. You can also purchase node upgrades, as needed. For example, if you have UTM-1 Edge X16 and you need secure Internet access for more than 16 computers, you can upgrade to UTM-1 Edge X32 without changing your hardware.
Page 597
Upgrading Your License The UTM-1 Licensing Wizard opens, with the Install Product Key dialog box displayed. Click Enter a different Product Key. In the Product Key field, enter the new Product Key. Click Next. The Installed New Product Key dialog box appears. Chapter 19: Maintenance...
For technical support, contact Kiwi Enterprises. Note: When managed by SmartCenter, the appliance automatically sends logs to the SmartCenter Log Viewer using a secure protocol. You can still configure Syslog logging if desired. Check Point UTM-1 Edge User Guide...
Page 599
Configuring Syslog Logging To configure Syslog logging Click Setup in the main menu, and click the Logging tab. The Logging page appears. Complete the fields using the information in the following table. Click Apply. Table 120: Logging Page Fields In this field… Do this…...
See Using the UTM-1 Portal on page 587. • Using a console connected to the UTM-1 appliance. For information, see Using the Serial Console on page 589. • Using an SSH client. See Configuring SSH on page 595. Check Point UTM-1 Edge User Guide...
Page 601
Controlling the Appliance via the Command Line Using the UTM-1 Portal You can control your appliance via the UTM-1 Portal's command line interface. To control the appliance via the UTM-1 Portal Click Setup in the main menu, and click the Tools tab. The Tools page appears.
Page 602
In the upper field, type a command. You can view a list of supported commands using the command help. For information on all commands, refer to the Embedded NGX CLI Reference Guide. Click Go. The command is implemented. Check Point UTM-1 Edge User Guide...
Page 603
Controlling the Appliance via the Command Line Using the Serial Console You can connect a console to the UTM-1 appliance, and use the console to control the appliance via the command line. Note: Your terminal emulation software and your UTM-1 appliance's Serial port must be configured for the same speed.
Page 604
Controlling the Appliance via the Command Line The Ports page appears. Next to the Serial port, click Edit. Check Point UTM-1 Edge User Guide...
Page 605
Controlling the Appliance via the Command Line The Port Setup page appears. In the Assign to drop-down list, select Console. In the Port Speed drop-down list, select the Serial port's speed (in bits per second). The Serial port's speed must match that of the attached serial console. The default value is 57600.
Click Setup in the main menu, and click the Management tab. The Management page appears. Specify from where HTTPS access to the UTM-1 Portal should be granted. See Access Options on page 594 for information. Check Point UTM-1 Edge User Guide...
Page 607
Configuring HTTPS Warning: If remote HTTPS is enabled, your UTM-1 appliance settings can be changed remotely, so it is especially important to make sure all UTM-1 appliance users’ passwords are difficult to guess. Note: You can use HTTPS to access the UTM-1 Portal from your internal network, by surfing to https://my.firewall.
Page 608
Additional fields appear, in which you can enter the desired IP address range. Any IP address. Disabled Nowhere. This disables both local and remote access capability. This option is relevant to the SNMP protocol only. Check Point UTM-1 Edge User Guide...
Configuring SSH Configuring SSH UTM-1 appliance users can control the appliance via the command line, using the SSH (Secure Shell) management protocol. You can enable users to do so via the Internet, by configuring remote SSH access. You can also integrate the UTM-1 appliance with SSH- based management systems.
Page 610
The SSH configuration is saved. If you configured remote SSH access, you can now control the UTM-1 appliance from the Internet, using an SSHv2 client. For information on all supported commands, refer to the Embedded NGX CLI Reference Guide. Check Point UTM-1 Edge User Guide...
Configuring SNMP Configuring SNMP The UTM-1 appliance users can monitor the UTM-1 appliance, using tools that support SNMP (Simple Network Management Protocol). You can enable users to do so via the Internet, by configuring remote SNMP access. The UTM-1 appliance supports the following SNMP MIBs: •...
Page 612
SNMP clients uses the SNMP community string as a password, when connecting to the UTM-1 appliance. The default value is "public". It is recommended to change this string. To configure advanced SNMP settings, do the following: Click Advanced. Check Point UTM-1 Edge User Guide...
Page 613
Configuring SNMP The SNMP Configuration page appears. Complete the fields using the following table. Chapter 19: Maintenance...
Page 614
This information will be visible to SNMP clients, and is useful for administrative purposes. System Contact Type the name of the contact person. This information will be visible to SNMP clients, and is useful for administrative purposes. Check Point UTM-1 Edge User Guide...
Page 615
Configuring SNMP In this field... Do this… SNMP Port Type the port to use for SNMP. The default port is 161. Send SNMP Traps Select this option to enable sending SNMP traps. An SNMP trap is a notification sent from one application to another. Send Traps On: Indicates that SNMP traps will automatically be sent upon Startup / Shutdown...
The Tools page appears. Click Set Time. The UTM-1 Set Time Wizard opens displaying the Set the UTM-1 Time dialog box. Complete the fields using the information in Set Time Wizard Fields on page 604. Click Next. Check Point UTM-1 Edge User Guide...
Page 617
Setting the Time on the Appliance The following things happen in the order below: • If you selected Specify date and time, the Specify Date and Time dialog box appears. Set the date, time, and time zone in the fields provided, then click Next. •...
Page 618
Keep the current setting Do not change the appliance’s time. The current appliance time is displayed to the right of this option. Use a Time Server Synchronize the appliance time with a Network Time Protocol (NTP) server. Check Point UTM-1 Edge User Guide...
Page 619
Setting the Time on the Appliance Select this option… To do the following… Specify date and time Set the appliance to a specific date and time. Table 124: Time Servers Fields In this field… Do this… Primary Server Type the IP address of the Primary NTP server. Secondary Server Type the IP address of the Secondary NTP server.
IP address or DNS name is registered. This information is useful in tracking down hackers. Packet Sniffer Capture network traffic. This information is Using Packet Sniffer on page useful troubleshooting network problems. Check Point UTM-1 Edge User Guide...
Page 621
Using Diagnostic Tools Using IP Tools To use an IP tool Click Setup in the main menu, and click the Tools tab. The Tools page appears. In the Tool drop-down list, select the desired tool. In the Address field, type the IP address or DNS name for which to run the tool.
Page 622
If you selected WHOIS, the following things happen: The UTM-1 appliance queries the Internet WHOIS server. A window displays the name of the entity to which the IP address or DNS name is registered and their contact information. Check Point UTM-1 Edge User Guide...
Page 623
Using Diagnostic Tools Using Packet Sniffer The UTM-1 appliance includes the Packet Sniffer tool, which enables you to capture packets from any internal network or UTM-1 port. This is useful for troubleshooting network problems and for collecting data about network behavior. The UTM-1 appliance saves the captured packets to a file on your computer.
Page 624
Browse to a destination directory of your choice. Type a name for the configuration file and click Save. The *.cap file is created and saved to the specified directory. Click Cancel to close the Packet Sniffer window. Check Point UTM-1 Edge User Guide...
Page 625
Using Diagnostic Tools Table 126: Packet Sniffer Fields In this field… Do this… Interface Select the interface from which to collect packets. The list includes the primary Internet connection, the UTM-1 appliance ports, and all defined networks. Filter String Type the filter string to use for filtering the captured packets. Only packets that match the filter condition will be saved.
Page 626
The and element is used to concatenate filter string elements. The filtered packets must match all concatenated filter string elements. YNTAX element and element [and element...] element && element [&& element...] ARAMETERS element String. A filter string element. Check Point UTM-1 Edge User Guide...
Page 627
Using Diagnostic Tools XAMPLE The following filter string saves packets that both originate from IP address is 192.168.10.1 and are destined for port 80: src 192.168.10.1 and dst port 80 URPOSE The dst element captures all packets with a specific destination. YNTAX dst destination ARAMETERS...
Page 628
String. The protocol type of the packet. ip, ip6, arp, rarp, This can be the following: atalk, aarp, dec net, sca, lat, mopdl, moprc, iso, stp, ipx, netbeui XAMPLE The following filter string saves ARP packets: ether proto arp Check Point UTM-1 Edge User Guide...
Page 629
Using Diagnostic Tools host URPOSE The host element captures all incoming and outgoing packets for a specific computer. YNTAX host host ARAMETERS host IP Address or String. The computer to/from which the packet is sent. This can be the following: •...
Page 630
Note: This element can be prepended by tcp or udp. For information, see tcp on page 618 and udp on page 619. ARAMETERS port Integer. The port from/to which the packet is sent. Check Point UTM-1 Edge User Guide...
Page 631
Using Diagnostic Tools XAMPLE The following filter string saves all packets that either originated from port 80, or are destined for port 80: port 80 URPOSE The src element captures all packets with a specific source. YNTAX src source ARAMETERS source IP Address or String.
Page 632
- Capture all TCP packets destined for a specific port. • port - Capture all TCP packets originating from or destined for a specific port. • src port - Capture all TCP packets originating from a specific port. Check Point UTM-1 Edge User Guide...
Page 633
Using Diagnostic Tools XAMPLE The following filter string captures all TCP packets: XAMPLE The following filter string captures all TCP packets destined for port 80: tcp dst port 80 URPOSE The udp element captures all UDP packets. This element can be prepended to port-related elements.
To export the UTM-1 appliance configuration to your computer Click Setup in the main menu, and click the Tools tab. The Tools page appears. Click Export. A standard File Download dialog box appears. Click Save. Check Point UTM-1 Edge User Guide...
Page 635
Backing Up the UTM-1 Appliance Configuration The Save As dialog box appears. Browse to a destination directory of your choice. Type a name for the configuration file and click Save. The *.cfg configuration file is created and saved to the specified directory. Click Finish.
Page 636
In the Import Settings field, type the full path to the configuration file. • Click Browse, and browse to the configuration file. Click Upload. A confirmation message appears. Click OK. The UTM-1 appliance settings are imported. Check Point UTM-1 Edge User Guide...
Resetting the UTM-1 Appliance to Defaults The Import Settings page displays the configuration file's content and the result of implementing each configuration command. Note: If the appliance's IP address changed as a result of the configuration import, your computer may be disconnected from the network; therefore you may not be able to see the results.
Page 638
Reset button automatically reverts the firmware version. To reset the UTM-1 appliance to factory defaults via the Web interface Click Setup in the main menu, and click the Tools tab. The Tools page appears. Click Factory Settings. Check Point UTM-1 Edge User Guide...
Page 639
Resetting the UTM-1 Appliance to Defaults A confirmation message appears. To revert to the firmware version that shipped with the appliance, select the check box. Click OK. • The Please Wait screen appears. • The UTM-1 appliance returns to its factory defaults. •...
The Tools page appears. Click Diagnostics. Technical information about your UTM-1 appliance appears in a new window. To save the displayed information to an *.html file: Click Save. A standard File Download dialog box appears. Check Point UTM-1 Edge User Guide...
Rebooting the UTM-1 Appliance Click Save. The Save As dialog box appears. Browse to a destination directory of your choice. Type a name for the configuration file and click Save. The *.html file is created and saved to the specified directory. To refresh the contents of the window, click Refresh.
Overview Chapter 20 Using Network Printers This chapter describes how to set up and use network printers. This chapter includes the following topics: Overview ....................629 Setting Up Network Printers..............630 Configuring Computers to Use Network Printers........632 Viewing Network Printers ................649 Changing Network Printer Ports...............650 Resetting Network Printers...............651 Overview Some UTM-1 models include a built-in print server, enabling you to connect USB-based...
See Connecting the Appliance to Network Printers on page 83. Turn the printer on. In the UTM-1 Portal, click Network in the main menu, and click the Ports tab. The Ports page appears. Next to USB, click Edit. Check Point UTM-1 Edge User Guide...
Page 645
Setting Up Network Printers The USB Devices page appears. If the UTM-1 appliance detected the printer, the printer is listed on the page. If the printer is not listed, check that you connected the printer correctly, then click Refresh to refresh the page. Next to the printer, click Edit.
If the computer for which you want to enable printing is located on the WAN, create an Allow rule for connections from the computer to This Gateway. See Adding and Editing Rules on page 338. Click Start > Control Panel. Check Point UTM-1 Edge User Guide...
Page 647
Configuring Computers to Use Network Printers The Control Panel window opens. Under Hardware and Sound, click Printer. Chapter 20: Using Network Printers...
Page 648
Configuring Computers to Use Network Printers The Printers screen appears. Click Add a printer. The Add Printer wizard opens displaying the Choose a local or network printer screen. Click Add a local printer. Click Next. Check Point UTM-1 Edge User Guide...
Page 649
Configuring Computers to Use Network Printers The Choose a printer port dialog box appears. Click Create a new port. In the Type of port drop-down list, select Standard TCP/IP Port. Click Next. The Type a printer hostname or IP address dialog box appears. 10.
Page 650
13. Select the Query the printer and automatically select the driver to use check box. 14. Click Next. The following things happen: • If Windows cannot identify your printer, the Additional Port Information Required dialog box appears. Do the following: 1) Click Custom. 2) Click Settings. Check Point UTM-1 Edge User Guide...
Page 651
Configuring Computers to Use Network Printers The Configure Standard TCP/IP Port Monitor dialog box opens. 3) In the Protocol area, make sure that Raw is selected. 4) In the Port Number field, type the printer's port number, as shown in the Printers page.
Page 652
18. Right-click the printer and click Properties in the popup menu. The printer's Properties dialog box opens. 19. In the Ports tab, in the list box, select the port you added. The port's name is IP_<LAN IP address>. 20. Click OK. Check Point UTM-1 Edge User Guide...
Page 653
Configuring Computers to Use Network Printers Windows 2000/XP This procedure is relevant for computers with a Windows 2000/XP operating system. To configure a computer to use a network printer If the computer for which you want to enable printing is located on the WAN, create an Allow rule for connections from the computer to This Gateway.
Page 654
Note: Do not select the Automatically detect and install my Plug and Play printer check box. Click Next. The Select a Printer Port dialog box appears. Click Create a new port. In the Type of port drop-down list, select Standard TCP/IP Port. 10. Click Next. Check Point UTM-1 Edge User Guide...
Page 655
Configuring Computers to Use Network Printers The Add Standard TCP/IP Port Wizard opens with the Welcome dialog box displayed. 11. Click Next. The Add Port dialog box appears. 12. In the Printer Name or IP Address field, type the UTM-1 appliance's LAN IP address, or "my.firewall".
Page 656
16. In the Port Number field, type the printer's port number, as shown in the Printers page. 17. In the Protocol area, make sure that Raw is selected. 18. Click OK. The Add Standard TCP/IP Printer Port Wizard reappears. Check Point UTM-1 Edge User Guide...
Page 657
Configuring Computers to Use Network Printers 19. Click Next. The Completing the Add Standard TCP/IP Printer Port Wizard dialog box appears. 20. Click Finish. The Add Printer Wizard reappears, with the Install Printer Software dialog box displayed. 21. Do one of the following: •...
Page 658
24. Right-click the printer and click Properties in the popup menu. The printer's Properties dialog box opens. 25. In the Ports tab, in the list box, select the port you added. The port's name is IP_<LAN IP address>. 26. Click OK. Check Point UTM-1 Edge User Guide...
Page 659
Configuring Computers to Use Network Printers MAC OS-X This procedure is relevant for computers with the latest version of the MAC OS-X operating system. Note: This procedure may not apply to earlier MAC OS-X versions. To configure a computer to use a network printer If the computer for which you want to enable printing is located on the WAN, create an Allow rule for connections from the computer to This Gateway.
Page 660
Configuring Computers to Use Network Printers The Print & Fax window appears. In the Printing tab, click Set Up Printers. The Printer List window appears. Click Add. Check Point UTM-1 Edge User Guide...
Page 661
Configuring Computers to Use Network Printers New fields appear. In the first drop-down list, select IP Printing. In the Printer Type drop-down list, select Socket/HP Jet Direct. In the Printer Address field, type the UTM-1 appliance's LAN IP address, or "my.firewall".
Page 662
12. In the Model Name list, select the desired model. 13. Click Add. The new printer appears in the Printer List window. 14. In the Printer List window, select the newly added printer, and click Make Default. Check Point UTM-1 Edge User Guide...
Viewing Network Printers Viewing Network Printers To view network printers Click Network in the main menu, and click the Ports tab. The Ports page appears. Next to USB, click Edit. The USB Devices page appears, displaying a list of connected printers. For each printer, the model, serial number, and status is displayed.
The USB Devices page appears, displaying a list of connected printers. Next to the desired printer, click Edit. The Printer Setup page appears. In the printer's Printer Server TCP Port field, type the desired port number. Click Apply. Check Point UTM-1 Edge User Guide...
Resetting Network Printers Resetting Network Printers You can cause a network printer to restart the current print job, by resetting the network printer. You may want to do this if the print job has stalled. To reset a network printer Click Network in the main menu, and click the Ports tab.
Connectivity Chapter 21 Troubleshooting This chapter provides solutions to common problems you may encounter while using the UTM-1 appliance. Note: For information on troubleshooting wireless connectivity, see Troubleshooting Wireless Connectivity on page 302. This chapter includes the following topics: Connectivity .................... 653 Service Center and Upgrades..............
Page 668
You can view this setting in the Network > Internet Setup page. • Advanced ADSL configuration fine tuning options are available via the CLI. For information, refer to the Embedded NGX CLI Reference Guide. Check Point UTM-1 Edge User Guide...
Page 669
Connectivity I cannot access http://my.firewall or http://my.vpn. What should I do? • Verify that the UTM-1 appliance is operating. • Check if the LED for the LAN port used by your computer is green. If not, check if the network cable linking your computer to the UTM-1 appliance is connected properly.
Page 670
Configuring Servers on page 331. I run a public Web server at home but it cannot be accessed from the Internet. What should I Configure a virtual Web Server. For instructions, see Configuring Servers on page 331. Check Point UTM-1 Edge User Guide...
While trying to connect to a Service Center, I received the message “The Service Center did not respond”. What should I do? • If you are using a Service Center other than the Check Point Service Center, check that the Service Center IP address is typed correctly. •...
When you have finished using the application, make sure to clear the exposed host setting, otherwise your security might be compromised. In the UTM-1 Portal, I do not see the pop-up windows that the guide describes. What should I Disable any pop-up blockers for http://my.firewall. Check Point UTM-1 Edge User Guide...
Federal Communications Commission Radio Frequency Interference Statement ....................674 Technical Specifications Check Point is committed to protecting the environment. The latest UTM-1 unified threat management appliance models are compliant with the RoHS Directive, meeting the European Union's strict restrictions on hazardous substances.
Page 674
Technical Specifications UTM-1 Edge X and UTM-1 Edge W Table 127: UTM-1 ADSL Models Attributes Attribute UTM-1 Edge X ADSL UTM-1 Edge W ADSL SBXD-166LHGE-5 SBXWD-166LHGE-5 Physical Attributes Dimensions 200 x 33 x 122 mm 200 x 33 x 130 mm (width x height x depth) (7.87 x 1.3 x 4.8 inches)
Page 675
RoHS & WEEE ADSL Part 68.CS03 Part 68.CS03 R&TTE .FCC15C, TELCO Table 128: UTM-1 Non-ADSL Models Attributes Attribute UTM-1 Edge X UTM-1 Edge W SBX-166LHGE-5 SBXW-166LHGE-5 Physical Attributes Dimensions 200 x 33 x 122 mm 200 x 33 x 130 mm (width x height x depth) (7.87 x 1.3 x 4.8 inches)
Page 676
ISO9001, ISO 14001, TL9000 CE . FCC 15B.VCCI CE . FCC 15B.VCCI Reliability EN 300 019 - 1, 2, 3 EN 300 019 - 1, 2, 3 Environment RoHS & WEEE RoHS & WEEE Check Point UTM-1 Edge User Guide...
Page 677
MTBF (hours) 68,000 hours at 30ºC 68,000 hours at 30ºC R&TTE .FCC15C,TELCO Table 129: UTM-1 Non-ADSL Models Attributes Attribute UTM-1 Edge W SBXW-166LHGE-6 Physical Attributes Dimensions 200 x 32 x 128 mm (width x height x depth) (7.87 x 1.26 x 5.04 inches) Weight 685 g (1.51 lbs)
Page 678
ISO 9001, 9002, 14001 FCC Part 15 B & C AS/NZS 4268: 2003 A1 Reliability EN 300 019 - 1, 2, 3 Environment RoHS & WEEE MTBF (hours) 68,000 hours at 30ºC R&TTE .FCC15C, TELCO Check Point UTM-1 Edge User Guide...
Page 679
Technical Specifications Table 130: UTM-1 Edge X Industrial Attributes Attribute UTM-1 Edge X Industrial SBXI-166LHGE-6 Physical Attributes Dimensions 200 x 32 x 128 mm (7.87 x 1.26 x 5.04 inches) (width x height x depth) Weight Without DIN rail adapter: 650 g (1.43 lbs) With DIN rail adapter: 750 g (1.65 lbs)
Page 680
0ºC ~ 55ºC * Operation Humidity: 10% ~ 95% Storage/Operation (non-condensed) * Extended operating temperature range of -20°C~+55°C was tested (see UTM-1 Edge X Industrial on page 669, “Extended Temperatures Test”) Wireless Attributes Table 131: UTM-1 Wireless Attributes Attribute All Wireless Models Operation Frequency 2.412-2.484 MHz...
CE Declaration of Conformity CE Declaration of Conformity UTM-1 Edge X, Edge X ADSL, Edge W, and Edge W ADSL SofaWare Technologies Ltd., 3 Hilazon St., Ramat-Gan Israel, Hereby declares that this equipment is in conformity with the essential requirements specified in Article 3.1 (a) and 3.1 (b) of:...
Page 682
Directive) and FCC Part 15 Class B. The product has been tested in a typical configuration. For a copy of the Original Signed Declaration (in full conformance with EN45014), please contact SofaWare at the above address. Check Point UTM-1 Edge User Guide...
Page 683
• Directive 73/23/EEC (Low Voltage Directive – LVD) • Directive 99/05/EEC (Radio Equipment and Telecommunications Terminal Equipment Directive) In accordance with the following standards: Table 133: UTM-1 Edge X Industrial Appliance Standards Standard Description Comments CISPR 22 Radiated and Conducted...
Page 684
IEC 61000-4-6 Immunity to conducted 0.15-80 MHz, 3 Vrms, 80% AM, 1 kHz disturbances, induced by Performance Criterion A radio-frequency fields IEC 61000-4-8 Power frequency 50 Hz, 1 A/m magnetic field immunity Performance Criterion A Check Point UTM-1 Edge User Guide...
Page 685
CE Declaration of Conformity IEC 61000-4-11 Voltage dips, short i) >95% reduction -0.5 period, Performance interruptions and voltage Criterion B variations immunity ii) 30% reduction – 25 period, Performance Criterion C Voltage Interruptions: i) >95% reduction – 250 period, Performance Criterion C Safety EN 60950-1...
Page 686
Humidity Cycling: 40°C, 95%, 2 cycles Water: 0.01m3/minute, 90 Kpa, 15 minutes Random Vibration: 5-20-200Hz/0.01g2/Hz - 3dB, 30 minutes/axis, 1.5 hours Bump: 6ms, 18g, 100 bumps per face Drop: 100 cm, 1 corner, 3 edges and 6 face Check Point UTM-1 Edge User Guide...
Page 687
CE Declaration of Conformity EN 300 019-2-3 Environment Low Temperature: -5°C, 16 hours (with cold T3.2 (Operational) start test) High Temperature: 55°C, 16 hours (with hot start test) Temperature change: 25°C~+55°C, 3 hours dwell, 5 cycles, 0.5°C/minute, 30 hours Humidity: 30°C, 93%, 96 hours Humidity Cycling: 55°C, 50~95%, 1 cycles Sine Vibration: 5-62-200Hz/5?/s-0.2g, 1 octave/minute, 5 cycles/axis, X, Y, and Z...
Performance, and could result in violation of Part 15 of the FCC Rules. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device Check Point UTM-1 Edge User Guide...
Page 689
Federal Communications Commission Radio Frequency Interference Statement must accept any interference received, including interference that may cause undesired operation. This Class B digital apparatus complies with Canadian ICES-003. FCC Radiation Exposure Statement for Wireless Models This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment.
Glossary of Terms Glossary of Terms Certificate Authority The Certificate Authority (CA) issues ADSL Modem certificates to entities such as gateways, A device connecting a computer to the users, or computers. The entity later Internet via an existing phone line. uses the certificate to identify itself and ADSL (Asymmetric Digital Subscriber provide verifiable information.
Page 692
"handles", that are translated computer that are designed to watch out into IP addresses. for, seize and then transmit to another computer, specific types of data. An example of a Domain Name is 'www.sofaware.com'. Check Point UTM-1 Edge User Guide...
Page 693
Glossary of Terms HTTPS IP Spoofing Hypertext Transfer Protocol over Secure A technique where an attacker attempts Socket Layer, or HTTP over SSL. to gain unauthorized access through a false source address to make it appear as A protocol for accessing a secure Web though communications have originated server.
Page 694
IP address. NAT common customer premises equipment can be used to map several internal IP (e.g. modem). addresses to a single IP address, thereby sharing a single IP address assigned by the ISP among several PCs. Check Point UTM-1 Edge User Guide...
Page 695
Stateful Inspection was invented by individually to the IP program layer. Check Point to provide the highest level Although each packet has the same of security by examining every layer destination IP address, it may get routed within a packet, unlike other systems of differently through the network.
Page 696
UDP is often used for applications such as streaming data. A URL (Uniform Resource Locator) is the address of a file (resource) accessible on the Internet. The type of Check Point UTM-1 Edge User Guide...
Need help?
Do you have a question about the UTM-1 Edge and is the answer not in the manual?
Questions and answers