throbber
Check Point FireWall-1™
`White Paper
`
`Version 3.0 — June 1997
`P/N 400-3000
`
`http://www.checkpoint.com
`
`Executive Summary
`Expanding Internet technologies have redefined corporate approaches to
`internetworking and security. As the Internet becomes the forum for corporate
`communications and international commerce, enterprises require an innovative,
`comprehensive security solution.
`
`Check Point Software Technologies Ltd. meets these growing connectivity needs
`with FireWall-1, the leading network security solution. FireWall-1 enables
`enterprises to define and enforce a single, comprehensive security policy while
`providing full, transparent connectivity. Utilizing Check Point’s patented Stateful
`Inspection Technology and Open Platform for Secure Enterprise Connectivity
`(OPSEC), FireWall-1 integrates and centrally manages all aspects of network
`security.
`
`This document describes the unique features of Check Point FireWall-1’s Security
`Suite, and also presents OPSEC, an innovative framework that provides
`integrated management for FireWall-1 and third-party security applications. In
`addition, simple step-by-step procedures demonstrate how to build a FireWall-1
`Rule Base to implement a security policy for both a simple and more detailed
`network configuration. Finally, performance data illustrates how FireWall-1’s
`high levels of speed, transparency and efficiency deliver unmatched network
`security.
`
`In This Document:
`
`The Check Point FireWall-1 Security Suite
`Configuring FireWall-1
`Performance
`Conclusion
`
`page 3
`page 24
`page 31
`page 32
`
`0001
`
`Blue Coat Systems - Exhibit 1067
`
`

`
`Copyrights and Trademarks
`© 1994–1997 Check Point Software Technologies Ltd.
`
`Copyrights and Trademarks
`
`All rights reserved. This product and related documentation are protected by copyright and
`distributed under licensing restricting their use, copying, distribution, and decompilation. No part of
`this product or related documentation may be reproduced in any form or by any means without prior
`written authorization of Check Point. While every precaution has been taken in the preparation of
`this book, Check Point assumes no responsibility for errors or omissions. This publication and
`features described herein are subject to change without notice.
`
`RESTRICTED RIGHTS LEGEND:
`
`Use, duplication, or disclosure by the government is subject to restrictions as set forth in
`subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS
`252.227-7013 and FAR 52.227-19.
`
`TRADEMARKS:
`
`FireWall-1, SecuRemote, Stateful Inspection, INSPECT, Check Point and the Check Point logo are
`trademarks or registered trademarks of Check Point Software Technologies Ltd. Sun, SPARC, Solaris
`and SunOS are trademarks of Sun Microsystems, Inc. UNIX and OPEN LOOK are registered
`trademarks of UNIX System Laboratories, Inc. Cisco is a registered trademark of Cisco Systems, Inc.
`Bay Networks is a registered trademark of Bay Networks, Inc. Security Dynamics and SecurID are
`registered trademarks and ACE/Server is a trademark of Security Dynamics Technologies, Inc. HP is
`a registered trademark of Hewlett-Packard Company. Windows is a trademark and Microsoft is a
`registered trademark of Microsoft Corporation. Telnet is a registered trademark of SoftSwitch, Inc.
`Netscape Communications, Netscape, Netscape Navigator and the Netscape Communications logo are
`trademarks of Netscape Communications Corporation.
`
`All other products or services mentioned herein are trademarks or registered trademarks of their
`respective owners. The products described in this document may be protected by one or more U.S.
`patents, foreign patents, or pending applications.
`
`Check Point Software Technologies Ltd.
`International Headquarters:
`3A Jabotinsky
`Ramat Gan 52520, Israel
`Tel: 972-3-613 1833
`Fax: 972-3-575 9256
`
`e-mail: info@checkpoint.com
`
`U.S. Headquarters:
`400 Seaport Court, Suite 105
`Redwood City, CA 94063
`Tel: 800-429-4391
` 415-562-0400
`Fax: 415-562-0410
`HTTP://www.checkpoint.com
`
`2
`
`0002
`
`

`
`The Check Point FireWall-1 Security Suite
`
`The Check Point FireWall-1 Security Suite
`Check Point FireWall-1’s comprehensive Security Suite delivers an enterprise-wide
`security solution that goes far beyond the capabilities of previous firewall solutions.
`FireWall-1’s unique and innovative Security Suite includes:
`Open Platform for Secure Enterprise Connectivity (OPSEC)
`•
`Stateful Inspection Technology
`•
`Enterprise-wide Security Management
`•
`• Distributed Client/Server Architecture
`Authentication
`•
`Network Address Translation
`•
`Encryption
`•
`Content Security
`•
`Connection Control
`•
`Router Management
`•
`
`OPSEC
`
`Check Point’s OPSEC introduces a new standard in enterprise security that
`integrates all aspects of network security through a single, extensible
`management framework.
`
`OPSEC allows enterprises to take full advantage of the FireWall-1 Security Suite
`and other security applications. The OPSEC framework provides central
`configuration and management for FireWall-1, while integrating third party
`security applications. Enterprises can choose the security components, from
`Check Point and other vendors, that best meet their requirements. OPSEC is
`both open and extensible, incorporating a variety of security applications in a
`single, centrally managed security system. Enterprises can take full advantage of
`the latest security technologies and can upgrade individual components without
`having to reconfigure an entire security system.
`
`Enterprises can plug into Check Point’s OPSEC framework in the following ways:
`OEM/Bundling
`•
`The FireWall-1 Inspection Module runs directly on third-party security
`equipment.
`Published APIs
`Check Point provides Application Programming Interfaces for open protocols.
`Network Security Applications
`FireWall-1 supports third-party applications securely out-of-the-box.
`
`•
`
`•
`
`The OPSEC Model
`
`In the OPSEC framework, the enterprise security system is composed of several
`components, each of which is provided by different a different vendor and
`installed on a different machine. FireWall-1 distributes security tasks to the
`OPSEC components. Transactions between FireWall-1 and OPSEC security
`components take place using open, industry standard protocols.
`
`3
`
`0003
`
`

`
`The Check Point FireWall-1 Security Suite
`
`Example OPSEC components are:
`a CVP (Content Vectoring Protocol) server that examines files for viruses
`•
`a UFP (URL Filtering Protocol) server that categorizes URLs
`•
`
`Published APIs
`OPSEC provides C language APIs for configuring transactions between FireWall-1
`and OPSEC components. The OPSEC API is a powerful and easy to use
`environment that defines an asynchronous interface suitable for developing:
`servers that implement one or more OPSEC security tasks
`•
`clients that use an OPSEC server
`•
`
`OPSEC Client/Server Interaction
`In a common OPSEC model, FireWall-1 acts as a client sending requests to an
`OPSEC server. FireWall-1 intercepts a connection and generates a request to the
`OPSEC server. The server processes the request and sends a reply to FireWall-1.
`FireWall-1 processes the original connection based on the reply.
`
`OPSEC
`Client
`
`OPSEC
`API
`
`FireWall
`Module
`
`OPSEC
`API
`
`OPSEC
`API
`
`OPSEC
`Server
`
`Figure 1
`
`OPSEC Client/Server Communication
`
`For example, FireWall-1 intercepts a connection request from an internal host to
`a specific URL. FireWall-1 passes the request to a UFP server, which checks a
`list of permitted and denied URLs. The UFP server sends FireWall-1 a reply
`stating that the requested URL is a denied Web site. FireWall-1 denies the
`original connection.
`
`In the “standard” framework, FireWall-1 is the OPSEC client, but other scenarios
`are also possible:
`An OPSEC client (not a FireWall) communicates directly with an OPSEC server
`•
`without the intervention of a FireWall Module.
`A FireWall Module acts as the OPSEC server
`
`•
`
`Stateful Inspection Technology
`
`FireWall-1’s patented Stateful Inspection Technology delivers full firewall
`capabilities, assuring the highest level of network security. FireWall-1’s powerful
`Inspection Module analyzes all packet communication layers and extracts the
`relevant communication and application state information. The Inspection
`
`4
`
`0004
`
`

`
`The Check Point FireWall-1 Security Suite
`
`Module understands and can learn any protocol and application. By employing
`this flexible, extensible technology, FireWall-1 meets the dynamic security
`requirements of today’s enterprise.
`
`FireWall-1 Inspection Module
`The FireWall-1 Inspection Module resides in the operating system kernel, below
`the Network layer, at the lowest software level. By inspecting communications at
`this level, FireWall-1 can intercept and analyze all packets before they reach the
`operating systems. No packet is processed by any of the higher protocol layers
`unless FireWall-1 verifies that it complies with the enterprise security policy.
`
`FireWall-1 Inspection Module
`
`IP TCP Session
`
`Application
`
`Packet
`Matches
`Rule?
`
`No
`
`Is There
`Another
`Rule?
`
`Yes
`
`Yes
`
`Log/Alert
`
`Pass
`the
`Packet?
`
`Yes
`
`No
`
`No
`
`Send NACK
`
`Drop the Packet
`
`END
`
`Communication Layers
`
`7 Application
`
`6 Presentation
`
`5 Session
`
`4 Transport
`
`3 Network
`FireWall-1 Inspection Module
`2 Data Link
`
`1 HW Connection
`
`Figure 2
`
`FireWall-1 Inspection Module
`
`Full State Awareness
`The Inspection Module has access to the “raw message,” and can examine data
`from all packet layers. In addition, FireWall-1 analyzes state information from
`previous communications and other applications. The Inspection Module
`examines IP addresses, port numbers, and any other information required in
`order to determine whether packets comply with the enterprise security policy.
`
`The Inspection Module stores and updates state and context information in
`dynamic connections tables. These tables are continually updated, providing
`cumulative data against which FireWall-1 checks subsequent communications.
`
`FireWall-1 follows the security principle of “All communications are denied
`unless expressly permitted.” By default, FireWall-1 drops traffic that is not
`explicitly allowed by the security policy and generates real-time security alerts,
`providing the system manager with complete network status.
`
`Securing “Stateless” Protocols
`The FireWall-1 Inspection Module understands the internal structures of the IP
`protocol family and applications built on top of them. For stateless protocols
`such as UDP and RPC, the Inspection Module extracts data from a packet's
`application content and stores it in the state connections tables, providing
`
`5
`
`0005
`
`

`
`The Check Point FireWall-1 Security Suite
`
`context in cases where the application does not provide it. In addition, the
`Inspection Module can dynamically allow or disallow connections as necessary.
`These capabilities provide the highest level of security for complex protocols.
`
`FireWall-1 Inspection Module
`
`Client
`
`record in
`connections
`table
`
`src sport dst dport
`
`src sport dst dport
`
`lookup in
`connections
`table
`
`Server
`
`Figure 3
`
`FireWall-1 Inspecting a UDP Session
`
`INSPECT Language
`Using Check Point’s INSPECT language, FireWall-1 incorporates security rules,
`application knowledge, context information, and communication data into a
`powerful security system.
`
`INSPECT is an object-oriented, high-level script language that provides the
`Inspection Module with the enterprise security rules. In most cases, the security
`policy is defined using FireWall-1’s graphical interface. From the security policy,
`FireWall-1 generates an Inspection Script, written in INSPECT. Inspection Code
`is compiled from the script and loaded on to the FireWalled enforcement points,
`where the Inspection Module resides. Inspection Scripts are ASCII files, and can
`be edited to facilitate debugging or meet specialized security requirements.
`
`INSPECT provides system extensibility, allowing enterprises to incorporate new
`applications, services, and protocols simply by modifying one of FireWall-1's
`built-in script templates using the graphical user interface.
`
`Enterprise-Wide Security Management
`
`Centralized Security Policy
`
`FireWall-1 allows an enterprise to define and implement a single, centrally
`managed security policy. A FireWall-1 security policy is expressed in terms of a
`Rule Base and Properties.
`
`The Rule Base is an ordered set of rules against which each communication is
`tested, while Properties define overall standards of communication inspection.
`FireWall-1 rules specify the source, destination, service and action taken for each
`communication. The security rules also specify which communication events are
`logged and the information included in each log entry.
`
`The security policy is managed and updated from a single, centralized
`workstation. All communications between this workstation and FireWalled
`enforcement points are authenticated and transmitted on secure channels.
`
`6
`
`0006
`
`

`
`The Check Point FireWall-1 Security Suite
`
`Graphical User Interface
`
`FireWall-1’s intuitive graphical user interface offers a powerful set of tools for
`the centralized management and implementation of an enterprise security policy.
`
`Object-Oriented Management
`Rule Base Editor
`
`FireWall-1’s object-oriented Rule Base enables an enterprise to easily define and
`implement a comprehensive security policy. Administrators can specify
`enterprise networks, users, and servers, and the relationships between them.
`This centrally managed solution makes it easy to modify network object
`parameters and update the security policy.
`
`Figure 4
`
`FireWall-1 Rule Base Editor
`
`A FireWall-1 Rule Base specifies the actions taken on communication attempts —
`whether they are allowed, disallowed, logged, etc.
`
`7
`
`0007
`
`

`
`The Check Point FireWall-1 Security Suite
`
`Properties Setup
`
`A security policy is defined not only by the Rule Base, but also by the
`parameters in the Properties Setup window. Properties define the overall aspects
`of communication inspection without the need to specify repetitive details in the
`Rule Base.
`
`Figure 5
`
`Properties Setup window - Security Policy tab
`
`Object Managers
`
`Object Managers make it easy to define all the network’s elements in terms of
`object classes and their properties. Objects can be grouped in families or
`organized in hierarchies for more efficient control. Object properties can be
`centrally managed and updated.
`
`Every object has a set of attributes, such as network address, subnet-mask, etc.
`The user specifies some of these attributes, while others are extracted by
`FireWall-1 from the network databases, like the hosts and networks files,
`
`8
`
`0008
`
`

`
`The Check Point FireWall-1 Security Suite
`
`Network Information Services (NIS/Yellow Pages), and the Internet domain
`service. SNMP agents are used for extracting additional information, including
`the interfaces and network configuration of hosts, routers and gateways.
`
`Figure 6
`
`Workstation Properties window - General tab
`
`•
`
`•
`
`FireWall-1’s graphical user interface allows Administrators to define the
`following object classes:
`Network Objects — networks and sub-networks, hosts, gateways and servers
`•
`(FireWalled or not), routers, Internet domains, and logical servers
`Users — individuals and groups accessing the network
`Administrators can define user access privileges, including allowed sources and
`destinations as well as user authentication schemes.
`Services — services known to the system and used in the security policy
`FireWall-1 includes a comprehensive set of over 100 TCP/IP and Internet
`services. New services can be added easily.
`Resources — sets of entities which can be accessed by a specific protocol
`FireWall-1 Resources can be defined based on HTTP, FTP and SMTP.
`Time Objects — time periods during which rules are in effect
`Servers — content screening and authentication servers
`Keys — encryption keys for interoperability with third party encryption
`devices that do not support automated key management
`
`•
`
`•
`•
`•
`
`Visual Tracking and Accounting: Log Viewer
`FireWall-1’s graphical Log Viewer provides visual tracking, monitoring and
`accounting information for all connections passing through FireWalled gateways.
`On-line viewing features enable real-time monitoring of communication activities
`and alerts. The Log Viewer also displays significant network events, such as
`security policy installations or system shutdowns.
`
`9
`
`0009
`
`

`
`The Check Point FireWall-1 Security Suite
`
`The Log Viewer provides precise control over the log file display, providing quick
`access to relevant information. Administrators can customize the Log Viewer to
`display or hide specific fields. Logs and log records can be filtered and searched
`to quickly locate and track events of interest. Colors and icons attached to
`events and fields also facilitate tracking.
`
`Figure 7
`
`Log Viewer
`
`Reports are easily generated by applying selection criteria to chosen fields,
`providing both detailed and comprehensive views. Reports can be printed or
`exported to third party applications, such as spreadsheets or trouble-ticketing
`systems. Exported log information is authenticated and transmitted on secure
`channels to protect sensitive auditing information.
`
`Real-time Alerting: System Status Viewer
`FireWall-1 provides real-time status, auditing, and alerting capabilities. The
`System Status window displays a snapshot of all the FireWalled systems
`throughout the enterprise. The status of each FireWalled host is available at a
`glance. The System Status window also provides packet statistics — the number
`of packets accepted, logged or rejected — for each FireWalled host.
`
`10
`
`0010
`
`

`
`The Check Point FireWall-1 Security Suite
`
`Administrators can also specify an action taken if the status of a FireWalled host
`changes. For example, FireWall-1 can issue an alert notifying system managers of
`any suspicious activity.
`
`Figure 8
`
`System Status Window
`
`Anti-Spoofing
`FireWall-1 detects spoofed packets by checking that the source IP address of a
`packet entering a FireWalled gateway corresponds to the appropriate gateway
`interface. FireWall-1’s object-oriented interface allows Security Administrators to
`define anti-spoofing for all gateway interfaces and generate alerts.
`
`The Interface Properties window specifies anti-spoofing detection. Figure 9
`depicts the anti-spoofing properties for a gateway’s external interface — le0. By
`specifying “Others” under Valid Addresses, the Security Administrator assures
`that only packets that whose source IP address does not belong to the networks
`behind this gateway will be allowed to pass.
`
`Figure 9
`
`Interface Properties window with anti-spoofing defined
`
`11
`
`0011
`
`

`
`Distributed Client/Server Architecture
`
`The Check Point FireWall-1 Security Suite
`
`FireWall-1 manages the enterprise security policy through a distributed
`Client/Server architecture that ensures high performance, scalability and
`centralized control.
`
`FireWall-1 consists of two primary modules — the Management Module and the
`FireWall Module. These modules can be deployed in a number of flexible
`Client/Server configurations across a broad range of platforms (see “Platform
`Summary” on page 34).
`
`FireWall-1’s Client/Server architecture is completely integrated. There is only
`one security policy and one Rule Base, defined and maintained at a single
`management point, which controls multiple FireWalled enforcement points.
`
`Management Module
`The Management Module includes the GUI and the management database
`functionalities — the Rule Base, network objects, services, users etc. The
`security policy is defined on the GUI. The components of the Management
`Module can reside on the same machine or be deployed in a Client/Server
`configuration (see Figure 10 on page 13).
`
`FireWall Module
`The FireWall Module includes the Inspection Module and Security Servers.
`
`The FireWall Module implements the security policy, logs events, and
`communicates with the Management Module using the FireWall daemons. A
`machine on which the FireWall-1 Inspection Module is installed is known as a
`“FireWalled system.”
`
`The FireWall Module can be installed on a broad range of platforms (see
`“Platform Summary” on page 34). It usually resides on a dual-homed host (a
`gateway) but can also be installed on a server.
`
`A FireWall-1 security policy is defined using the GUI on the Management
`Module. Inspection Code is then generated and installed on the FireWall
`Modules that will enforce the security policy.
`
`The Management Module GUI client, the Management Module server and the
`FireWall Module can be installed on the same computer if its platform supports
`all three components, or on three different computers. In either case, the System
`Administrator defines and maintains the security policy on the Management
`Module, while the FireWalled Gateways (where the FireWall Module is installed)
`enforce the security policy.
`
`Distributed Configurations
`Figure 10 depicts a distributed configuration, on which a Management Module
`(in the Client/Server implementation) controls three FireWall Modules, each of
`which is on a different platform, which in turn protect three heterogeneous
`networks.
`
`12
`
`0012
`
`

`
`The Check Point FireWall-1 Security Suite
`
`In this configuration the Security Administrator can configure and monitor
`network activity for several sites from a single desktop machine. The security
`policy is defined on the GUI Client, while the FireWall database is maintained on
`the Management Server. The connections between the client, server and multiple
`enforcement points are secured, enabling true remote management.
`1
`
`This Management
`Module ...
`
`Management
`Server
`
`GUI
`Client
`
`Intranet
`
`FireWalled
`Gateway
`(Sun)
`
`Router
`
`Internet
`
`Router
`
`FireWalled
`Gateway
`(NT)
`
`2 3
`
`... manages these
`FireWall Modules ...
`
`... that protect
`these networks.
`
`NFS
`Server
`
`Database
`Server
`
`Internal
`FireWall
`(HP)
`
`Legend
`= Unix
`
`= PC
`
`NOTE: The Management Module can also manage
`FireWall Modules on Bay Networks routers and
`Xylan switches, and Access Lists for routers.
`
`Figure 10
`
`Distributed FireWall-1 Configuration
`
`Although FireWall-1 is deployed in a distributed configuration, security policy
`enforcement is completely integrated. Any number of FireWall Modules can be
`set-up, monitored and controlled from a single workstation, but there is still
`only one enterprise-wide security policy maintained by a single rule base and log
`file. Authorized management clients can access security control information from
`anywhere on the network.
`
`Authentication
`
`FireWall-1 provides remote users and telecommuters secure, authenticated access
`to enterprise resources using multiple authentication schemes. FireWall-1
`authentication services securely validate users or clients that try to access the
`internal network. Modifications to local servers or client applications are not
`required. Authentication services are fully integrated into the enterprise-wide
`security policy and can be centrally managed through FireWall-1’s graphical user
`interface. All authentication sessions can be monitored and tracked through the
`Log Viewer.
`
`13
`
`0013
`
`

`
`The Check Point FireWall-1 Security Suite
`
`Authentication Methods
`
`FireWall-1 provides three authentication methods:
`1. User Authentication
`2. Client Authentication
`Session Authentication
`3.
`
`User Authentication
`FireWall-1’s transparent User Authentication provides access privileges on a per
`user basis for FTP, TELNET, HTTP, and RLOGIN, regardless of the user’s IP
`address. If a local user is temporarily away from the office and logging in on a
`different host, the Security Administrator may define a rule that allows that user
`to work on the local network without extending access to all users on the same
`host.
`
`The FireWall-1 Security Servers implement user authentication on the gateway.
`FireWall-1 intercepts a user’s attempt to start an authenticated session on the
`requested server and directs the connection to the appropriate Security Server.
`After the user is authenticated, the FireWall-1 Security Server opens a second
`connection to the host. All subsequent packets of the session are intercepted and
`inspected by FireWall-1 on the gateway.
`
`Client Authentication
`Client Authentication enables an administrator to grant access privileges to a
`specific user at a specific IP address. In contrast to User Authentication, Client
`Authentication is not restricted to specific services, but provides a mechanism
`for authenticating any application, standard or custom. FireWall-1 Client
`Authentication is not transparent, but it does not require any additional
`software or modifications on either the client or server. The administrator can
`determine how each individual is authenticated, which servers and applications
`are accessible, at what times and days, and how many sessions are permitted.
`
`Session Authentication
`Session Authentication can be used to authenticate any service on a per-session
`basis. After the user initiates a connection to the server, FireWall-1 opens a
`connection with a Session Authentication Agent. The Agent performs the
`required authentication, after which FireWall-1 allows the connection to continue
`to the requested server.
`
`Authentication Schemes
`
`2.
`
`FireWall-1 supports the following authentication schemes:
`S/Key — The user is challenged to enter the value of requested S/Key iteration.
`1.
`SecurID — The user is challenged to enter the number displayed on the
`Security Dynamics SecurID card.
`3. OS Password — The user is challenged to enter his or her OS password.
`Internal — The user is challenged to enter his or her internal FireWall-1
`4.
`password on the gateway.
`RADIUS — The user is challenged for a response, as defined by the RADIUS
`server.
`
`5.
`
`14
`
`0014
`
`

`
`The Check Point FireWall-1 Security Suite
`
`6.
`
`Axent — The user is challenged for the response, as defined by the Axent
`server.
`
`Network Address Translation
`
`FireWall-1’s Network Address Translation features provide complete Internet
`access for internal hosts with invalid or secret IP addresses. Internal hosts can
`be accessible from the Internet, even though their internal IP addresses are
`invalid Internet addresses. FireWall-1 supports both IP address hiding and static
`Address Translation, providing full Internet connectivity for internal clients. At
`the same time, FireWall-1 completely integrates Address Translation rules in the
`security policy, maintaining full network security.
`
`Configuring Address Translation
`
`FireWall-1 Address Translation rules can be simply generated and integrated into
`the enterprise security policy. FireWall-1 provides three methods for configuring
`Address Translation:
`Automatic Configuration
`1.
`Address Translation Rule Base (Windows and X/Motif only)
`Command Line Interface
`
`2.
`
`3.
`
`Automatic Configuration
`Address Translation properties can be defined for particular objects, such as
`workstations or networks. Address Translation rules are then automatically
`generated, and the object’s properties are applied whenever it is used in the
`security policy.
`
`Figure 11
`
`Automatically Generating Address Translation for a network
`
`Graphical Address Translation Rule Base
`FireWall-1’s graphical user interface simplifies the definition and implementation
`of Address Translation rules. This flexible Address Translation Rule Base allows
`administrators to:
`specify objects by name rather than by IP address
`•
`
`15
`
`0015
`
`

`
`The Check Point FireWall-1 Security Suite
`
`•
`
`•
`•
`•
`
`restrict rules to specified destination IP addresses, as well as to the specified
`source IP Addresses
`translate both source and destination IP addresses in the same packet
`restrict rules to specified services (ports)
`translate ports
`
`Figure 12
`
`Address Translation Graphical User Interface
`
`Command-Line Interface
`Address Translation rules can be defined using a command line interface
`application (fwxlconf). It is also possible to directly edit the text file
`$FWDIR/conf/xlate.conf.
`
`Translation Modes
`
`FireWall-1 supports two kinds of Address Translation modes to protect internal
`addressing schemes while providing full Internet access:
`• Dynamic
`FireWall-1 translates many invalid addresses to a single valid address and
`dynamically assigns port numbers to distinguish between the invalid address.
`Dynamic address translation is called “Hide Mode,” because the invalid
`address are hidden behind the valid address.
`Static
`FireWall-1 translates each invalid address to a corresponding valid address.
`
`•
`
`Virtual Private Networks
`
`Long-distance communications between enterprises, partners, branch offices and
`mobile users have become essential to business relations. Enterprises are
`increasingly using public networks, such as the Internet, as a flexible, cost-
`effective connection between their private networks. However, public networks
`expose corporations to the following dangers:
`break-ins — unauthorized Internet access to internal networks
`•
`eavesdropping — enterprise communications can be monitored and tampered
`•
`with as they travel over the Internet
`
`Check Point FireWall-1 allows enterprises to take full advantage of Virtual
`Private Networks. FireWall-1’s encryption services establish secure
`communication channels over the Internet, assuring full privacy, authenticity
`and data integrity in corporate internetworking.
`
`16
`
`0016
`
`

`
`The Check Point FireWall-1 Security Suite
`
`FireWall-1 Encryption
`
`FireWall-1 provides transparent, selective encryption for a wide range of
`services, allowing organizations to make full use of the Internet for all business
`and connectivity needs. Multiple encryption schemes, key management and an
`internal Certificate Authority are fully integrated with other FireWall-1 features.
`FireWall-1’s intuitive graphical interface makes it simple to define and manage
`encryption in an enterprise security policy.
`
`Secure VPNs
`FireWalled gateways encrypt data communications traveling over the Internet
`between private networks, creating secure, Virtual Private Networks. FireWall-1
`implements encryption for corporate internetworks without the need to install
`and configure encryption software on every host in the networks involved. A
`FireWalled gateway performs encryption on behalf of its encryption domain
`—the local area network (LAN) or group of networks that it protects. Behind the
`gateway, in the internal networks, packets are not encrypted. Only packets
`traveling over public segment of the connection are encrypted.
`
`Selective Encryption
`FireWall-1's selective encryption feature allows the transmission of both clear
`and encrypted data between the same workstations and networks. Instead of
`encrypting all communications between corporate networks, FireWall-1 allows
`administrators to define the specific services that require encryption.
`
`Multiple Encryption Schemes
`FireWall-1 supports three encryption schemes:
`FWZ, a proprietary FireWall-1 encryption scheme
`1.
`2. Manual IPSec, an encryption and authentication scheme that uses fixed keys
`SKIP (Simple Key-Management for Internet Protocols), developed by Sun
`3.
`Microsystems, that adds improved keys and key management to IPSec
`
`17
`
`0017
`
`

`
`The Check Point FireWall-1 Security Suite
`
`The relationship between the components of the encryption schemes, as
`implemented in FireWall-1, is illustrated in Table 1.
`
`Table 1
`
` Comparison of Encryption Schemes
`feature
`FWZ
`portability
`Check Point
`proprietary
`
`key management
`Session Keys
`
`number of keys
`required is
`proportional to the...
`packet size
`gateway can
`encrypt/decrypt on
`behalf of other hosts
`
`yes
`each TCP or
`UDP session
`has a new key
`
`number of
`correspondents
`
`unchanged
`yes
`
`Manual IPSec
`standard
`
`no
`fixed
`
`square of the
`number of
`correspondents
`increased
`yes (in Tunnel
`Mode)
`
`SKIP
`standard
`supported by Sun
`and other vendors
`yes
`keys change over
`time or as amount
`of data encrypted
`exceeds threshold
`number of
`correspondents
`
`increased
`yes (in Tunnel
`Mode)
`
`DES, FWZ1 and RC4 are all encryption algorithms used to encrypt the data
`portion of a packet.
`
`High Efficiency and Performance
`FireWall-1 encryption does not alter communication length, maintains MTU
`validity and eliminates packet fragmentation, thus achieving the highest
`performance available over the network. FireWall-1 supports encryption speeds
`greater than 10 Mb/sec through a standard desktop workstation. In addition,
`routing priorities and policies are preserved.
`
`FireWall-1 SecuRemote
`
`FireWall-1 SecuRemote extends the Virtual Private Network to the desktop and
`laptop. Mobile and remote Microsoft Windows 95 and NT users can connect to
`their enterprise networks via dial-up Internet connections — either directly to
`the server or t

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket