throbber
Check Point FireWall-1 Guide
`
`NG FP3
`
`For additional technical information about Check Point products, consult Check Point’s SecureKnowledge at
`
`http://support.checkpoint.com/kb/
`
`Part No.: 700527
`September 2002
`
`Juniper Ex. 1045-p. 1
`Juniper v Huawei
`
`

`

`' 2000-2002 Check Point Software Technologies Ltd.
`All rights reserved. This product and related documentation are protected by copyright
`and distributed under licensing restricting their use, copying, distribution, and
`decompilation. No part of this product or related documentation may be reproduced in
`any form or by any means without prior written authorization of Check Point. While
`every precaution has been taken in the preparation of this book, Check Point assumes
`no responsibility for errors or omissions. This publication and features described herein
`are subject to change without notice.
`RESTRICTED RIGHTS LEGEND:
`Use, duplication, or disclosure by the government is subject to restrictions as set forth
`in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause
`at DFARS 252.227-7013 and FAR 52.227-19.
`TRADEMARKS:
`Check Point, the Check Point logo, ClusterXL, ConnectControl, FireWall-1, FireWall-1,
`FireWall-1 GX, FireWall-1 SecureServer, FireWall-1 SmallOffice, FireWall-1 VSX,
`FireWall-1 XL, FloodGate-1, INSPECT, INSPECT XL, IQ Engine, Open Security
`Extension, OPSEC, Provider-1, SecureKnowledge, SecurePlatform, SecureXL,
`SiteManager-1, SmartCenter, SmartCenter Pro, SmartDashboard, SmartDefense,
`SmartLSM, SmartMap, SmartUpdate, SmartView, SmartView Monitor, SmartView
`Reporter, SmartView Status, SmartView Tracker, SVN, UAM, User-to-Address Mapping,
`UserAuthority, VPN-1, VPN-1 Accelerator Card, VPN-1 Appliance, VPN-1 Certificate
`Manager, VPN-1 Gateway, VPN-1 Net, VPN-1 Pro, VPN-1 SecureClient, VPN-1
`SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer VPN-1 SmallOffice and VPN1
`VSX are trademarks or registered trademarks of Check Point Software Technologies
`Ltd. or its affiliates. All other product names mentioned herein are trademarks or
`registered trademarks of their respective owners.
`The products described in this document are protected by U.S. Patent No. 5,606,668,
`5,699,431 and 5,835,726 and may be protected by other U.S. Patents, foreign patents,
`or pending applications.
`THIRD PARTIES:
`Entrust is a registered trademark of Entrust Technologies, Inc. in the United States and
`other countries. Entrust(cid:146)s logos and Entrust product and service names are also
`trademarks of Entrust Technologies, Inc. Entrust Technologies Limited is a wholly
`owned subsidiary of Entrust Technologies, Inc. FireWall-1 and SecuRemote incorporate
`certificate management technology from Entrust.
`Verisign is a trademark of Verisign Inc.
`The following statements refer to those portions of the software copyrighted by
`University of Michigan.
`Portions of the software copyright ' 1992-1996 Regents of the University of Michigan.
`All rights reserved. Redistribution and use in source and binary forms are permitted
`provided that this notice is preserved and that due credit is given to the University of
`Michigan at Ann Arbor. The name of the University may not be used to endorse or
`promote products derived from this software without specific prior written permission.
`This software is provided (cid:147)as is(cid:148) without express or implied warranty.
`Copyright ' Sax Software (terminal emulation only).
`The following statements refer to those portions of the software copyrighted by
`Carnegie Mellon University.
`Copyright 1997 by Carnegie Mellon University. All Rights Reserved.
`
`Permission to use, copy, modify, and distribute this software and its documentation for
`any purpose and without fee is hereby granted, provided that the above copyright notice
`appear in all copies and that both that copyright notice and this permission notice
`appear in supporting documentation, and that the name of CMU not be used in
`advertising or publicity pertaining to distribution of the software without specific, written
`prior permission.
`CMU DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE,
`INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN
`NO EVENT SHALL CMU BE LIABLE FOR ANY SPECIAL, INDIRECT OR
`CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING
`FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF
`CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR
`IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
`The following statements refer to those portions of the software copyrighted by The
`Open Group.
`THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
`EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
`MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
`NONINFRINGEMENT. IN NO EVENT SHALL THE OPEN GROUP BE LIABLE FOR
`ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF
`CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
`WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
`The following statements refer to those portions of the software copyrighted by The
`OpenSSL Project.
`This product includes software developed by the OpenSSL Project for use in the
`OpenSSL Toolkit (http://www.openssl.org/).*
`THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ‘‘AS IS’’ AND ANY *
`EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
`IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
`PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
`ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
`SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
`LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
`USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
`AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
`OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
`OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
`SUCH DAMAGE.
`The following statements refer to those portions of the software copyrighted by Eric
`Young.
`THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ‘‘AS IS’’ AND ANY EXPRESS OR
`IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
`WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
`PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
`CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
`EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
`TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
`DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
`ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR
`TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
`THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
`DAMAGE.
`Copyright ' 1998 The Open Group.
`
`September 2002
`
`Check Point Software Technologies Ltd.
`International Headquarters:
`3A Jabotinsky Street
`Ramat Gan 52520, Israel
`Tel: 972-3-753 4555
`Fax: 972-3-575 9256
`e-mail: info@CheckPoint.com
`
`U.S. Headquarters:
`Three Lagoon Drive, Suite 400
`Redwood City, CA 94065
`Tel: 800-429-4391; (650) 628-2000
`Fax: (650) 654-4233
`http://www.checkpoint.com
`
`Please direct all comments regarding this publication to techwriters@checkpoint.com.
`
`Juniper Ex. 1045-p. 1
`Juniper v Huawei
`
`

`

`Table Of Contents
`
`Preface
`
`Chapter 1
`
`Who Should Use this User Guide 9
`Summary of Contents 9
`Check Point Documentation 10
`What Typographic Changes Mean 12
`Shell Prompts in Command Examples 13
`Network Topology Examples 13
`
`SmartDefense
`Overview 15
`Configuring SmartDefense 16
`Anti Spoofing Configuration 17
`Denial of Service 18
`Teardrop 20
`Ping of Death 21
`LAND 22
`IP and ICMP 22
`Fragment Sanity Check 24
`Packet Sanity 25
`Max Ping Size 26
`TCP 26
`SYN Attack 27
`Small PMTU 30
`Sequence Verifier 32
`DNS 33
`FTP 34
`FTP Bounce Attack 35
`FTP Security Server 36
`HTTP 42
`General HTTP Worm Catcher 43
`HTTP Security Server 44
`SMTP Security Server 48
`SMTP Content 49
`Mail and Recipient Content 50
`Successive Events 52
`Address Spoofing 53
`Port Scanning 55
`Local Interface Spoofing 56
`Successive Alerts 57
`Successive Multiple Connections 58
`SYN Attacks and SYNDefender 58
`Guidelines for Deploying SYNDefender 64
`
`Table of Contents 3
`
`Juniper Ex. 1045-p. 1
`Juniper v Huawei
`
`

`

`Network Address Translation (NAT)
`Introduction 67
`The Need for Address Translation 67
`Example 69
`Configuring Network Address Translation 70
`Address Translation Modes 70
`Hide Mode 71
`Statically Translating Addresses 75
`Address Translation and Routing 78
`Configuring Routing on the Gateway 78
`IANA Recommendations 86
`Supported Services 86
`Restrictions 86
`FTP port command 87
`Generating Address Translation Rules Automatically 87
`Overview 87
`Network Address Translation Rule Base 89
`Overview 89
`Structure of a NAT Rule 89
`NAT Rule Base Example 91
`Defining Address Translation Rules 93
`Using the NAT Rule Base Editor 93
`Address Translation Examples 102
`Gateway with Two Interfaces 102
`Gateway with Three Interfaces 106
`Advanced Topics 112
`Rule Base 112
`Overlapping NAT 113
`Implementation 116
`Frequently Asked Questions 116
`
`Authentication
`Overview 123
`VPN-1/FireWall-1 Authentication 123
`Three Types of Authentication 124
`User Authentication 126
`User Authentication — Overview 127
`User Authentication — Deployment 127
`Non-Transparent User Authentication 140
`User Authentication and the HTTP Security Server - 142
`Session Authentication 162
`Session Authentication — Overview 162
`Session Authentication — Deployment 164
`Client Authentication 173
`Client Authentication — Overview 173
`Client Authentication — Deployment 177
`Single Sign On — Additional Features 190
`Client Authentication — Examples of Sign On Methods 193
`
`Chapter 2
`
`Chapter 3
`
`4
`
`Juniper Ex. 1045-p. 1
`Juniper v Huawei
`
`

`

`Chapter 4
`
`Chapter 5
`
`Encrypted Client Authentication 201
`Client Authentication — Security Considerations 202
`Client Authentication — Additional Features 202
`
`Security Servers and Content Security
`Security Servers 205
`Overview 205
`Security Servers and the Rule Base 208
`Interaction with OPSEC Products 222
`Defining Security Servers 224
`Content Security 227
`Resources and Security Servers 228
`Web (HTTP) 230
`Mail (SMTP) 233
`FTP 234
`CVP Inspection 234
`CVP Load Sharing and Chaining 236
`Security Server Configuration 237
`fwauthd.conf file 237
`
`ClusterXL
`Installing and Licensing ClusterXL 241
`State Synchronization 243
`Full and Delta Synchronization 243
`Secured Interfaces 244
`Implementing Synchronization 244
`Selective Synchronization 245
`Different Routes for Connections (Asymmetric Routing) 246
`Timing Issues 247
`Synchronized Cluster Restrictions 248
`Troubleshooting State Synchronization 249
`Check Point High Availability and Load Sharing Solutions 250
`High Availability—Overview 250
`Load Sharing—Overview 250
`High Availability Modes 251
`Improvements in Load Sharing 252
`When Does a Failover Occur? 252
`What Happens When a Gateway Recovers? 253
`VLAN Support 253
`How a Recovered Cluster Member Obtains the Latest Security Policy 253
`Cluster Protocols 254
`Configuring High Availability and Load Sharing 255
`Example New CPHA and Load Sharing Topology 255
`Example Legacy CPHA Topology 257
`Moving from a Single Enforcement Module to Load Sharing or New CPHA 260
`Configuring Load Sharing or New CPHA from Scratch 264
`Moving Between New CPHA and Load Sharing 268
`Moving from Legacy CPHA to New CPHA or Load Sharing 268
`
`Table of Contents 5
`
`Juniper Ex. 1045-p. 1
`Juniper v Huawei
`
`

`

`Chapter 6
`
`Chapter 7
`
`Configuring Legacy CPHA from Scratch 271
`Upgrading a Check Point High Availability Cluster 273
`Upgrading a Third Party cluster 274
`Adding Another Member to an Existing Cluster 274
`Moving from Load Sharing or New CPHA to Legacy CPHA 274
`Multicast Switch Settings for Load Sharing 275
`ClusterXL Advanced Settings 276
`High Availability and Load Sharing Commands 278
`Cluster Status Tools 278
`To Verify that Load Sharing Works Properly 278
`Status Manager 279
`Log Viewer 280
`
`VoIP (Voice Over IP)
`Overview 281
`H.323-Based VoIP 281
`Configuring VoIP (H.323) 282
`SIP-Based VoIP 288
`Configuration 288
`Configuring VoIP (SIP) 289
`
`Boot Security
`The Need for Boot Security 295
`Control of IP Forwarding 296
`The Default Filter 296
`Why the Default Filter is Needed 296
`What the Default filter Does 296
`Default Filter Operation 297
`The Initial Policy 298
`Stopping VPN-1/FireWall-1 for Remote Maintenance 300
`fwstop -default and fwstop -proc 300
`Changing Boot Security Settings 301
`Verifying the Default Filter 301
`control_bootsec 301
`fwboot bootconf 302
`comp_init_policy 303
`Standard Default Filter 303
`defaultfilter.boot 304
`defaultfilter.drop 304
`To change the Default Filter 304
`User-Defined Default Filter 304
`To unload a Default Filter or an Initial Policy 305
`Boot Security FAQ 305
`
`Chapter 8
`
`SNMP and Network Management Tools
`Overview 307
`VPN-1/FireWall-1 SNMP Agent (daemon) 307
`
`6
`
`Juniper Ex. 1045-p. 1
`Juniper v Huawei
`
`

`

`Chapter 9
`
`Chapter 10
`
`VPN-1/FireWall-1 HP OpenView Extension 310
`Installing the FireWall-1 HP OpenView Extension 310
`Uninstalling the VPN-1/FireWall-1 HP OpenView Extension 312
`Viewing FireWalled Objects 312
`VPN-1/FireWall-1 MIB Source 314
`
`ConnectControl — Server Load Balancing
`The Need for Server Load Balancing 319
`How Server Load Balancing Works 320
`Load Balancing using HTTP Logical Server 320
`Load Balancing using Non–HTTP Logical Server 321
`Load Balancing Algorithms 322
`Defining Logical Servers 322
`Rule Base 325
`Using HTTP Logical Servers in a Rule 325
`Using non-HTTP Logical Servers in a Rule 325
`Load Measuring 325
`
`FAQ (Frequently Asked Questions)
`Defining Objects and Services 327
`Daemons 332
`Security Servers 333
`Logging 337
`Security 338
`VPN-1/FireWall-1/n (VPN-1/FireWall-1/25, VPN-1/FireWall-1/50, etc.) Issues 339
`Supported Protocols and Interfaces 341
`Inspecting 342
` 342
`Administrative Issues 343
`Performance 344
`
`Table of Contents 7
`
`Juniper Ex. 1045-p. 1
`Juniper v Huawei
`
`

`

`8
`
`Juniper Ex. 1045-p. 1
`Juniper v Huawei
`
`

`

`Preface
`
`•
`
`Who Should Use this User Guide
`This User Guide is written for system administrators who are responsible for
`maintaining network security. It assumes you have a basic understanding and a working
`knowledge of:
`system administration
`•
`the Unix or Windows operating system
`the Windows GUI
`Internet protocols (IP, TCP, UDP etc.)
`
`•
`
`•
`
`Summary of Contents
`Chapter 1, “SmartDefense,” describes Check point’s SmartDefense feature, which
`actively protects an organization from known and unknown network attacks by using
`intelligent security technology.
`
`Chapter 7, “Boot Security,” describes how Check Point implements security
`immediately upon boot, even before VPN-1/FireWall-1 fully loads.
`
`Chapter 2, “Network Address Translation (NAT),” describes VPN-1/FireWall-1’s
`Network Address Translation feature.
`
`Chapter 3, “Authentication,” describes VPN-1/FireWall-1’s Authentication features.
`
`Chapter 4, “Security Servers and Content Security,” describes how to implement
`content security using Check Point Security Servers.
`
`Chapter 9, “ConnectControl — Server Load Balancing,” describes VPN-1/FireWall-1
`ConnectControl and Connection Accounting.
`
`Chapter 6, “VoIP (Voice Over IP),” describes Check Point protection for Voice Over
`IP connections.
`
`9
`
`Juniper Ex. 1045-p. 1
`Juniper v Huawei
`
`

`

`Chapter 5, “ClusterXL,” describes State Synchronization, High Availability
`(redundancy) and Load Sharing features for VPN/FIreWall Modules in a gatway
`cluster.
`
`Chapter 8, “SNMP and Network Management Tools,” describes how
`VPN-1/FireWall-1 interacts with network management tools.
`
`Chapter 10, “FAQ (Frequently Asked Questions),” is a compilation of Frequently
`Asked Questions about VPN-1/FireWall-1.
`
`Check Point Documentation
`User Guides are available for each product in Portable Document Format (PDF) in the
`Check Point Enterprise Suite. The Adobe Acrobat Reader is required to view PDF
`files and is also available on the Check Point Enterprise Suite CD-ROM. Alternatively,
`you can download the Acrobat Reader from the Adobe Web site
`(http://www.adobe.com).
`
`The following User Guides are available for Check Point Enterprise Suite products.
`
`1) Check Point Getting Started Guide — This book is an introduction to Check Point
`products.
`
`2) Check Point SmartCenter Guide — This book describes the Check Point
`Management GUI, which is used to manage VPN-1/FireWall-1 and other Check
`Point products.
`
`3) Check Point FireWall-1 — This book describes Check Point VPN-1/FireWall-1.
`
`4) Check Point Virtual Private Networks — This book describes the Check Point
`VPN-1/FireWall-1 encryption features.
`
`5) Check Point Desktop Client Guide — This book describes Check Point security as
`implemented by SecuRemote and SecureClient.
`
`6) Check Point FloodGate-1 — This book describes Check Point FloodGate-1, which
`enables administrators to manage the quality of service on their networks.
`
`7) Check Point Real Time Monitor — This book describes the Check Point Real Time
`Monitor, which enables administrators to monitor quality of service on their
`network links, as well as Service Level Agreement compliance.
`
`8) Check Point Provider-1 — This book describes Check Point
`Provider-1/SiteManager-1, which enables service providers and managers of large
`networks to provide Check Point products-based services to large numbers of
`subscribers.
`
`10
`
`Check Point FireWall-1 • September 2002
`
`Juniper Ex. 1045-p. 1
`Juniper v Huawei
`
`

`

`9) Check Point Reporting Module — This book describes the Check Point Reporting
`Module, which enables administrators to manage databases of Check Point log-
`based information.
`
`10) Check Point UserAuthority — This book describes Check Point UserAuthority,
`which enables third-party and Web applications to leverage Check Point’s
`sophisticated authentication and authorization technologies.
`
`11) Check Point User Management — This book describes Check Point LDAP-based user
`management.
`
`Note - For additional technical information about Check Point products, consult Check
`Point’s SecureKnowledge database at http://support.checkpoint.com/kb/
`
`11
`
`Juniper Ex. 1045-p. 1
`Juniper v Huawei
`
`

`

`What Typographic Changes Mean
`The following table describes the typographic changes used in this book.
`
`TABLE P-1 Typographic Conventions
`
`Typeface or
`Symbol
`
`AaBbCc123
`
`AaBbCc123
`
`AaBbCc123
`
`AaBbCc123
`
`Meaning
`
`Example
`
`The names of commands, files,
`and directories; on-screen
`computer output
`
`Edit your .login file.
`Use ls -a to list all files.
`machine_name% You have mail.
`
`What you type, when contrasted
`with on-screen computer output
`
`machine_name% su
`Password:
`
`Command-line placeholder:
`replace with a real name or value
`
`Book titles, new words or terms,
`or words to be emphasized
`
`To delete a file, type rm filename.
`
`Read Chapter 6 in User’s Guide. These
`are called class options.
`You must be root to do this.
`
`Save
`
`Text that appears on an object in
`a window
`
`Click the Save button.
`
`TABLE P-2 Command-line Usage Conventions
`
` Symbol
`
`Meaning
`
`Example
`
`[]
`
`Optional variable
`
` <>
`
`Compulsory variable
`
` |
`
`Use one of the alternatives
`
`fw ver [-k] [-f filename]
`Use either or both of the -k and the
`-f filename options.
`
`fw converthosts <input_file> [output_file]
`input_file is compulsory.
`output_file is optional
`
`cplic import <Module IP | object
`name>
`Use either the Module IP or the object
`name option
`
`Note - This note draws the reader’s attention to important information.
`
`12
`
`Check Point FireWall-1 • September 2002
`
`Juniper Ex. 1045-p. 1
`Juniper v Huawei
`
`

`

`Warning - This warning cautions the reader about an important point.
`
`Tip - This is a helpful suggestion.
`
`Shell Prompts in Command Examples
`The following table shows the default system prompt and superuser prompt for the C
`shell, Bourne shell, Korn shell and DOS.
`
`TABLE P-3 Shell Prompts
`
`Shell
`
`C shell prompt
`C shell superuser prompt
`Bourne shell and Korn shell
`prompt
`Bourne shell and Korn shell
`superuser prompt
`DOS
`
`Prompt
`
`machine_name%
`machine_name#
`
`$
`
`#
`
`current-directory>
`
`Network Topology Examples
`Network topology examples usually show a gateway’s name as a city name (for
`example, Paris or London) and the names of hosts behind each gateway as names of
`popular sites in those cities (for example, Eiffel and BigBen).
`
`13
`
`Juniper Ex. 1045-p. 1
`Juniper v Huawei
`
`

`

`14
`
`Check Point FireWall-1 • September 2002
`
`Juniper Ex. 1045-p. 1
`Juniper v Huawei
`
`

`

`C HA PT ER 1
`
`SmartDefense
`
`In This Chapter
`
`Overview
`Configuring SmartDefense
`Anti Spoofing Configuration
`Denial of Service
`IP and ICMP
`TCP
`DNS
`FTP
`HTTP
`SMTP Security Server
`Successive Events
`SYN Attacks and SYNDefender
`
`page 15
`page 16
`page 17
`page 18
`page 22
`page 26
`page 33
`page 34
`page 42
`page 48
`page 52
`page 58
`
`Overview
`Check Point SmartDefense creates a new category of Active Defense products that is
`unique to Check Point. It reactively protect organizations from known and unknown
`network attacks by using intelligent security technology. It frees the administrator from
`the need to understand technical attack details, making it possible concentrate on the
`task of defining the Access Control policy. SmartDefense requires a separate license.
`
`SmartDefense blocks attacks by type and class using Check Point’s Stateful Inspection
`technology and provides a single, centralized console to deliver real-time information
`on attacks as well as attack detection, blocking, logging, auditing and alerting.
`
`15
`
`Juniper Ex. 1045-p. 1
`Juniper v Huawei
`
`

`

`Configuring SmartDefense
`
`Check Point SmartDefense features:
`• Centralized, Type Based, Attack Prevention — Provides a single place of control for
`blocking known and unknown attacks using new attack type classification
`technology.
`• On-Line Updates & Web Worms Prevention — Enables on-line updates from
`Check Point's SmartDefense attack center to prevent new types of attacks, including
`new web worms patterns.
`• Real-time Attack Information — Using Check Point's on-line attack information
`center, security administrators can get updated information on each attack type.
`
`DoS (Denial of Service) and DDoS (Distributed Denial of Service) attacks, which are
`among the most common and damaging types of Internet attacks, are caused by
`attempts to flood networks or servers with mock traffic to prevent legitimate traffic
`from flowing through. SmartDefense actively detects and protects against these and
`other types of attacks, providing network resiliency to ensure mission critical resources
`are not affected while defending against an attack. SmartDefense mitigates risk and
`damage from DoS and DDoS attacks.
`
`Configuring SmartDefense
`To configure SmartDefense, click the SmartDefense button in the toolbar (FIGURE 1-
`1).
`FIGURE 1-1 SmartDefense button
`
`In the SmartDefense Settings window (FIGURE 1-2), configure the parameters for
`each of the attacks.
`
`Note - In many of the SmartDefense windows, a detailed description of the attack and the
`defense is displayed in the window.
`
`16
`
`Check Point FireWall-1 • September 2002
`
`Juniper Ex. 1045-p. 1
`Juniper v Huawei
`
`

`

`FIGURE 1-2 SmartDefense Settings window
`
`Update SmartDefense — Subscribers can click Update SmartDefense to obtain updated
`information about all attacks, as well as updated and new defenses against worms (see
`“General HTTP Worm Catcher” on page 43).
`
`Open Log Manager — Open the Log Viewer to view SmartDefense-related events.
`
`Anti Spoofing Configuration
`This page indicates how anti spoofing is configured on the gateways. You can change
`the settings by reconfiguring the individual gateways.
`
`Chapter 1
`
`SmartDefense
`
`17
`
`Juniper Ex. 1045-p. 1
`Juniper v Huawei
`
`

`

`FIGURE 1-3 Anti Spoofing Configuration page
`
`Denial of Service
`
`Denial of Service
`In contrast to an attack whose purpose is to penetrate the target system, the purpose of
`a Denial of Service attack is to overwhelm the target with spurious data to the point
`where it is no longer able to respond to legitimate service requests.
`
`A Denial of Service (DoS) attack floods a network with so many additional requests
`that regular traffic is either slowed or completely interrupted for some period. A
`distributed denial of service (DDoS) attack uses multiple computers throughout the
`network that it has previously infected. The computers work together to send out
`bogus messages, thereby increasing the amount of spurious traffic.
`
`Specify which of the attacks to defend against by checking the check box next to the
`attack’s name in the tree (FIGURE 1-4).
`
`18
`
`Check Point FireWall-1 • September 2002
`
`Juniper Ex. 1045-p. 1
`Juniper v Huawei
`
`

`

`FIGURE 1-4 Denial of Service page
`
`Accumulate successive events — Scan the VPN-1/FireWall-1 Log for evidence of
`Denial of Service attacks and take the action specified in Action when an attack is
`detected.
`
`If Accumulate successive events is not checked, you will still be protected from the
`attacks selected in the tree on the left.
`
`Action — Select the action to take if an attack is detected.
`
`Click Advanced to display the Advanced Configuration window (FIGURE 1-5).
`
`Chapter 1
`
`SmartDefense
`
`19
`
`Juniper Ex. 1045-p. 1
`Juniper v Huawei
`
`

`

`FIGURE 1-5 Denial of Service — Advanced Configuration window
`
`Denial of Service
`
`If, during the interval specified by Time interval, an event occurs Attempts number
`times, then an attack is considered to have occurred. This interval is monitored in
`segments of length specified by Resolution.
`
`Teardrop
`FIGURE 1-6 Denial of Service — Teardrop page
`
`Track — Select the action to take if an attack is detected.
`
`20
`
`Check Point FireWall-1 • September 2002
`
`Juniper Ex. 1045-p. 1
`Juniper v Huawei
`
`

`

`Ping of Death
`FIGURE 1-7 Denial of Service — Ping of Death page
`
`Ping of Death
`
`Track — Select the action to take if an attack is detected.
`
`Chapter 1
`
`SmartDefense
`
`21
`
`Juniper Ex. 1045-p. 1
`Juniper v Huawei
`
`

`

`LAND
`
`Denial of Service — LAND page
`
`IP and ICMP
`
`Track — Select the action to take if an attack is detected.
`
`IP and ICMP
`VPN-1/FireWall-1 handles ICMP with its Stateful Inspection method, so ICMP
`connections are fully inspected and different protocols types are identified, inspected,
`monitored and managed according to the packet flow security definitions. For each
`examined ICMP packet VPN-1/FireWall-1 identifies its protocol type, protocol header
`analysis and protocol flags analysis and verification.
`
`22
`
`Check Point FireWall-1 • September 2002
`
`Juniper Ex. 1045-p. 1
`Juniper v Huawei
`
`

`

`FIGURE 1-8 IP and ICMP page
`
`LAND
`
`Chapter 1
`
`SmartDefense
`
`23
`
`Juniper Ex. 1045-p. 1
`Juniper v Huawei
`
`

`

`Fragment Sanity Check
`FIGURE 1-9 Fragment Sanity Check page
`
`IP and ICMP
`
`Track — Select the action to take if an attack is detected.
`
`24
`
`Check Point FireWall-1 • September 2002
`
`Juniper Ex. 1045-p. 1
`Juniper v Huawei
`
`

`

`Packet Sanity
`
`Packet Sanity
`
`FIGURE 1-10Packet Sanity page
`
`Track — Select the action to take if an attack is detected.
`
`Enable relaxed UDP length verification — Select this option ignore cases where
`inconsistencies in the UDP length calculation methods used by different applications may result
`in spurious errors.
`
`Chapter 1
`
`SmartDefense
`
`25
`
`Juniper Ex. 1045-p. 1
`Juniper v Huawei
`
`

`

`Max Ping Size
`
`TCP
`
`FIGURE 1-11Max Ping Size page
`
`Track — Select the action to take if an attack is detected.
`
`Ping Size — Specify the maximum acceptable size of a PING packet.
`
`TCP
`
`VPN-1/FireWall-1 is able to identify the basic IP based protocols and analyze a packet
`in order to verify that it contains allowed options only.
`
`In order to verify that packets are legitimate, the following tests are conducted:
`protocol type verification
`•
`protocol header analysis
`protocol flags analysis and verification
`
`•
`
`•
`
`26
`
`Check Point FireWall-1 • September 2002
`
`Juniper Ex. 1045-p. 1
`Juniper v Huawei
`
`

`

`FIGURE 1-12TCP page
`
`SYN Attack
`
`Specify which of the attacks to defend against by checking the check box next to the
`attack’s name in the tree.
`
`SYN Attack
`
`For a detailed description of SYN attacks and SYNDefender, see “SYN Attacks and
`SYNDefender” on page 58.
`
`Chapter 1
`
`SmartDefense
`
`27
`
`Juniper Ex. 1045-p. 1
`Juniper v Huawei
`
`

`

`FIGURE 1-13SYN Attack.
`
`TCP
`
`Override module’s SYNDefender configuration — Select this option to specify that the
`settings on this page override the SYNDefender settings specified for individual
`Modules.
`
`SYN attack defense can be specified in two ways:
`• on a per-Module basis
`• in the SmartDefense SYN Attack page (FIGURE 1-13)
`
`Activate SYN Attack protection — If Override module’s SYNDefender configuration is
`checked, then you can activate protection for all Modules. Click Configure to specify
`the parameters of the protection method in the SYN Attack window (FIGURE 1-14).
`
`Early Versions SYNDefender configuration — Check this option to open the window
`(FIGURE 1-15) to configure SYNDefender protection for earlier version Modules.
`
`28
`
`Check Point FireWall-1 • September 2002
`
`Juniper Ex. 1045-p. 1
`Juniper v Huawei
`
`

`

`SYN Attack window (All Modules)
`FIGURE 1-14SYN Attack window
`
`SYN Attack
`
`Track — Select the action to take if an attack is detected.
`
`Track Level — Select one of the following:
`• Attacks only — The action specified under Track will be taken only when an
`attack is detected and when it is over.
`• Individual SYNs — The action specified under Track will be taken for each
`SYN packet.
`
`Timeout — Specifies how long SmartDefense waits for an acknowledgment before
`concluding that the connection is a SYN attack.
`
`Attack threshold — If more than Attack threshold unacknowledged SYN packets are
`detected at any one time, then SmartDefense will conclude that a SYN attack is taking
`place.
`
`Protect external interface only — Protect against SYN attacks only on the external
`interface.
`
`Chapter 1
`
`SmartDefense
`
`29
`
`Juniper Ex. 1045-p. 1
`Juniper v Huawei
`
`

`

`SYN Attack window (Earlier Versions)
`FIGURE 1-15SYN Attack window
`
`TCP
`
`Method — Choose one of the following:
`• None — SYNDefender is not deployed.
`
`If you choose this option, your network will not be protected from SYN attacks.
`• SYN Gateway — Deploy the SYN Gateway method.
`• Passive SYN Gateway — Deploy the Passive SYN Gateway method.
`
`Timeout — Specifies how long SYNDefender waits for an acknowledgment before
`concluding that the connection is a SYN attack.
`
`Maximum Sessions — Specifies the maximum number of protected sessions.
`
`This parameter is relevant only if Passive SYN Gateway is selected under Method. If
`SYN Relay is selected, all sessions are protected.
`
`This parameter specifies the number of entries in an internal connection table
`maintained by SYNDefender. If the table is full, SYNDefender will not examine new
`connections.
`
`Display Warning Messages — If set, SYNDefender will print console messages
`regarding its status.
`
`Small PMTU
`
`When a connection between two hosts is established, the sides involved exchange their
`TCP maximum segment size (MSS) values. The smaller of the two MSS values is used
`for the connection. The MSS for a system is usually the MTU (Maximum Transfer
`Unit) at the link layer minus 40 bytes for the IP and TCP headers.
`
`30
`
`Check Point FireWall-1 • September 2002
`
`Juniper Ex. 1045-p. 1
`Juniper v Huawei
`
`

`

`Small PMTU
`
`When TCP segments are destined to a non-local network, the Don’t Fragment bit is set
`in the IP header. Any router or media along the path may have an MTU that differs
`from that of the two hosts. If a media is encountered with an MTU that is too small for
`the IP datagram being routed, the router will attempt to fragment the datagram
`accordingly. Upon attempting to do so, it will find that the Don’t Fragment bit in the IP
`header is set. At this point, the router should inform the sending host with an ICMP
`destination unreachable message that the datagram cannot be forwarded further without
`fragmentation.
`
`When a network router receives a packet larger than the Maximum Transfer Unit
`(MTU) of the next network segment, and that packet’s IP layer Don’t Fragment bit is
`flagged, the router should send an ICMP destination unreachable message back to the
`sending host. When this does not happen, packets can be dropped, causing a variety of
`errors that will vary with the application that is communicating over the failed link.
`FIGURE 1-16Small PMTU page
`
`Track — Select the appropriate tracking option.
`
`Chapter 1
`
`SmartDefense
`
`31
`
`Juniper Ex. 1045-p. 1
`Juniper v Huawei
`
`

`

`TCP
`
`Minimal MTU size — Define the minimal allowed MTU. An exceedingly small value
`will not prevent an attack, while an unnecessarily la

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket