Thursday, March 19, 2020

Fundamental of Network Security with Check Point

Stateful Firewall

Stateful technology was introduced by Check Point(1994). A stateful firewall keep the network information in table. This table called state table. A state table keep the information of network packet attributes.

Example:
Source IP
Source
 Port
Destination IP
Destination 
Port
192.168.1.251
1050
172.217.167.228
80
192.168.0.251
1080
172.217.167.228
80
192.168.1.244
1099
172.217.167.228
80
192.168.1.231
1030
172.217.167.228
80

Packet Flow of Check Point Firewall

A packet flow is set of basic steps for packet attribute inspection and packet delivery.In this topic we will discuses about Check Point Packet flow. 

SAM(Suspicious Activity Monitoring) Database

SAM stands for Suspicious Activity Monitoring. SAM originally allows an Intrusion Detection System (IDS) to tell the firewall to block a source IP that was attacking in real time.

Anti Spoofing

When spoof packet(IP and MAC address already connect in LAN) request from the global  network to LAN then Check Point using anti-spoofing facility drop the spoof packet. 

Rule or Policy

A Policy is sat of security access credentials for secure network access by LAN users. 

Destination Network Address Translation

Destination NAT is performed on incoming packets, where the firewall translates a public destination address to a private address.

Route Lookup

When a packet arrives on a router interface, the router examines the credentials, and proceeds through the router lookup process.

Source Network Address Translation

Source NAT changes the source credentials in IP header of a packet. The typical usage is to change the a private credentials into a public credential for packets leaving your network.

Virtual Private Network

A virtual private network is secure way of extend the private network over public network.

Layer 7 Inspection 

Deep inspection of IP packet in this level.

Route

Throw out to destination.

Type Of Deployment

there are two type of deployment in Check Point.

1. Distributed Deployment

In this type of deployment we have two Check Point Security Box. One security box will work as Management Server and second security box work as gateway.

2. Standalone Deployment

In this type of deployment we have one security box and this security box works as management server and security gateway.

Three Layer Architecture Of Check Point

This is a basic terminology of Check Point.

1. Smart Management Server

Smart management server is very important part of security topology. By using Smart Management Server we can manage the security policy backup and routing on security gateway.

2. Security Gateway

The engine that enforces the organization's security policy, is an entry point to the LAN, and is managed by the Security Management Server.

3. Smart Console

Smart Console is sat of management configuration tools which use in Smart Management Server configuration.

Check Point Three Layer Architecture 

License of Check Point

Check Point licence based on proprietary. In case of Smart Management Server does not requirement of licence but is case of security gateway we require licence for different type of secure software blade like IPS IDS software blade, URL and mobile application software blade, QoS blade etc.

Thanks
Himanshu

No comments:

Post a Comment