Creating The Security Policy - Infinity CHECK POINT 1100 Administration Manual

Appliances centrally managed
Hide thumbs Also See for CHECK POINT 1100:
Table of Contents

Advertisement

5. Define all the IP addresses of the clustered interfaces. Use the existing gateway GW IP
address as the virtual IP of the cluster.
6. At the end of the wizard, select the Edit the cluster in Advanced Mode checkbox.
7. In Advanced Mode, enter all the relevant configuration settings from the GW to the cluster
object.
To reconfigure the existing Check Point Appliance:
1. In the WebUI, go to the GW and connect to it.
2. Reconfigure the IP addresses of the clustered interfaces with the actual IP addresses that is
used by the gateway as a member of the cluster.
Important - Downtime starts.
To configure the cluster in SmartDashboard:
1. Change the main IP and the IPs that appear in the topology table of the GW object.
2. Install policy on Cluster.
Important - Downtime ends. At this point, the cluster contains only one member, GW_2.
3. Go to Cluster Members > Add > Add existing gateway and edit the Cluster object.
4. If GW does not show in the list, press Help and make sure GW does not match any of the
categories that prevent it from being added to a cluster.
Note - Use the information on this Help page to determine if there are any configuration
settings you want to copy to the new Cluster object.
5. Under the new GW object, click Topology > Get Topology to edit the topology of the Cluster
object.
6. Install policy on Cluster.
Viewing Cluster Status in the WebUI
After you complete policy installation on the Check Point Appliance gateway and the gateway
works as a cluster member, you can view cluster status in the WebUI application (Device > High
Availability).

Creating the Security Policy

Working with Security Zone Objects
A security zone object is a logical object that represents the network behind a specified interface.
For example, an InternalZone object represents the internal network IPs behind all of the internal
gateway interfaces.
You can use security zone objects to create a generic Security Policy and reduce the amount of
rules necessary in the Rule Base. This Security Policy can be applied to numerous Check Point
Appliance gateways. Resolution of the security zone is done by the actual association on the Check
Point Appliance gateway object in SmartDashboard.
Check Point 1100/1200R/1400 Appliances Centrally Managed Administration Guide R77.20.70
Installation
|
17

Advertisement

Table of Contents
loading

Table of Contents