27
DualShield Unified Authentication for Check Point IPSEC & SSL VPN Implementation Guide Copyright 2010, Deepnet Security Limited.

DualShield Unified Authentication - Deepnet Security Point VPN... · DualShield RADIUS server which is a part of the DualShield Unified Authentication Platform. The aim of this integration

Embed Size (px)

Citation preview

Page 1: DualShield Unified Authentication - Deepnet Security Point VPN... · DualShield RADIUS server which is a part of the DualShield Unified Authentication Platform. The aim of this integration

DualShield Unified Authentication for Check Point IPSEC & SSL VPN

Implementation Guide

Copyright 2010,

Deepnet Security Limited.

Page 2: DualShield Unified Authentication - Deepnet Security Point VPN... · DualShield RADIUS server which is a part of the DualShield Unified Authentication Platform. The aim of this integration

Implementation Guide Check Point VPN

Copyright © 2011, Deepnet Security. All Rights Reserved. Page 1

Trademarks

DualShield Unified Authentication, MobileID, QuickID, PocketID, SafeID, GridID,

FlashID, SmartID, TypeSense, VoiceSense, MobilePass, DevicePass, RemotePass and Site Stamp are trademarks of Deepnet Security Limited. All other brand names and product names are trademarks or registered trademarks of their respective owners.

Copyrights

Under the international copyright law, neither the Deepnet Security software or documentation may be copied, reproduced, translated or reduced to any

electronic medium or machine readable form, in whole or in part, without the prior written consent of Deepnet Security.

Licence Conditions

Please read your licence agreement with Deepnet carefully and make sure you understand the exact terms of usage. In particular, for which projects, on which platforms and at which sites, you are allowed to use the product. You are not

allowed to make any modifications to the product. If you feel the need for any modifications, please contact Deepnet Security.

Disclaimer

This document is provided “as is” without warranty of any kind, either expressed or implied, including, but not limited to, the implied warranties of merchantability, fitness for a particular purpose, or non-infringement.

This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the document. Deepnet Security may make

improvements of and/or changes to the product described in this document at any time.

Contact

If you wish to obtain further information on this product or any other Deepnet Security products, you are always welcome to contact us.

Deepnet Security Limited Northway House 1379 High Road

London N20 9LP United Kingdom Tel: +44(0)20 8343 9663

Fax: +44(0)20 8446 3182 Web: www.deepnetsecurity.com Email: [email protected]

Page 3: DualShield Unified Authentication - Deepnet Security Point VPN... · DualShield RADIUS server which is a part of the DualShield Unified Authentication Platform. The aim of this integration

Implementation Guide Check Point VPN

Copyright © 2011, Deepnet Security. All Rights Reserved. Page 2

Table of Contents

1. Overview ................................................................................................ 3

2. Prerequisites ........................................................................................... 3

3. Configuring Check Point NG R55, NGX R60 ................................................. 4

3.1 Defining the Host Node ....................................................................... 4

3.2 Defining the RADIUS Server Object ...................................................... 5

3.3 Defining the External User Profile ......................................................... 6

3.4 Defining the User Group ...................................................................... 9

3.5 Configuring the Global Properties ....................................................... 10

4. Configuring Check Point SecureClient ....................................................... 15

5. Testing Check Point SecureClient ............................................................. 20

6. Configuring Check Point Connectra NGX R61/R62 ...................................... 23

7. Testing Check Point Connectra NGX R61/R62 ............................................ 25

Page 4: DualShield Unified Authentication - Deepnet Security Point VPN... · DualShield RADIUS server which is a part of the DualShield Unified Authentication Platform. The aim of this integration

Implementation Guide Check Point VPN

Copyright © 2011, Deepnet Security. All Rights Reserved. Page 3

1. Overview This document describes the integration between Check Point NG with Application Intelligence R55, Check Point NGX R60, Connectra NGX R61/R62 and the

DualShield RADIUS server which is a part of the DualShield Unified Authentication Platform. The aim of this integration is to add strong, two-factor authentication to the Check Point IPSEC and SSL VPN solutions using DualShield.

This integration works for all OTP (One-Time Password) tokens that DualShield supports, including Deepnet T-Pass, MobileID, SafeID as well as Deepet GridID.

2. Prerequisites This guide does not include instructions on the installation and configuration of the individual products used. It focuses on the configuration of the products to integrate them. Please see individual product documentation for full installation

and configuration instructions. Before you start, the following products should be installed and configured:

• Check Point NG R55 or NGX R60 - The Check Point VPN server should be

installed, configured and operational. Network connectivity should also be configured with RADIUS based communication being allowed between the

Check Point VPN server and DualShield RADIUS server. • Check Point Connectra NGX R61/R62 – The Check Point web security gateway

should be installed, configured and operational. Network connectivity should also be configured with RADIUS based communication being allowed between the Check Point Connectra gateway and DualShield RADIUS server.

• DualShield Authentication Server and DualShield Radius server should both be installed and configured. If this is not the case, please refer to the Installation and Administration Guides for the DualShield Unified Authentication Platform and DualShield Radius Server.

It is very important the above products are working correctly before you start the integration.

Page 5: DualShield Unified Authentication - Deepnet Security Point VPN... · DualShield RADIUS server which is a part of the DualShield Unified Authentication Platform. The aim of this integration

Implementation Guide Check Point VPN

Copyright © 2011, Deepnet Security. All Rights Reserved. Page 4

3. Configuring Check Point NG R55, NGX R60 IPSEC tunnels require that a secure session be established before any data exchange between client and switch. To establish such a session, a pre-shared

key is required. The client will be authenticated against the external server (Deepnet RADIUS Server). The client’s user name and password cannot be used to set up the tunnel since Check Point NG/NGX does not know the user ID or password as they are stored on the Active Directory to which the external

Deepnet RADIUS server points. To overcome this problem, the Group ID and Password (configured on both Check

Point NG and the client) are used to create a secure session so that the user name and password can then be securely passed to the authentication server. In this way Check Point NG/NGX establishes the "outer" tunnel with the client using the Group ID to bind the tunnel to a particular group and the password as a pre-

shared key. Once the "outer" tunnel is established, the clients’ ID and password are verified against the external RADIUS server (The actual user store is the Active Directory, to which the external RADIUS server points.). If RADIUS accepts

the authentication, the user tunnel is established and the user can send/receive traffic, if RADIUS rejects the authentication, Check Point NG/NGX brings the tunnel down.

There are several Check Point NG/NGX Network Objects that must be configured to integrate DualShield into the authentication process for end users. These are summarized below:

• Host Node • RADIUS Server Object • User Groups

• External User Profile In addition, certain Global Properties of Check Point NG/NGX must be modified as well.

Once these changes have been made, DualShield will provide two-factor authentication to those users tunnelling into Check Point NG/NGX.

3.1 Defining the Host Node

There are several steps that are necessary in defining a RADIUS server to Check Point NG/NGX. The first of which is to define the Host Node. In the Check Point SmartDashboard Console, select the Servers and OPSEC applications object tree, select Servers, right click and select New Host Node.... Enter the details of the

new Host Node using the following as your guide: Name A descriptive name for the Deepnet RADIUS server. This must be

unique.

IP Address The IP Address of the Deepnet RADIUS server.

Comment This is an optional field and allows you to add text to further describe your Deepnet RADIUS server.

Color Allows for color coding Network Objects within the

SmartDashboard. Follow internal standards or accept the default color.

Page 6: DualShield Unified Authentication - Deepnet Security Point VPN... · DualShield RADIUS server which is a part of the DualShield Unified Authentication Platform. The aim of this integration

Implementation Guide Check Point VPN

Copyright © 2011, Deepnet Security. All Rights Reserved. Page 5

Click the OK button to save your entry and exit the screen.

3.2 Defining the RADIUS Server Object

Within the SmartDashboard console, define a new RADIUS Server object. In the Servers and OPSEC applications object tree, select Servers, right click and select

New RADIUS.... Enter the details of the RADIUS server using the following as your guide:

Name A unique identifier given to the RADIUS Server object. Comment An optional field further describing the RADIUS Server Object. Color Allows for color coding Network Objects within the SmartDashboard.

Follow internal standards or take the default color. Host Describes the Host Node that will be associated with the RADIUS

Server Object. Select the Host Node defined within the previous

step. In this case, it is “deepnet”. Service Select the appropriate RADIUS service. There are two possible

selections: RADIUS and NEW-RADIUS. The RADIUS Service describes support for RADIUS running under port 1645 while NEW-

Page 7: DualShield Unified Authentication - Deepnet Security Point VPN... · DualShield RADIUS server which is a part of the DualShield Unified Authentication Platform. The aim of this integration

Implementation Guide Check Point VPN

Copyright © 2011, Deepnet Security. All Rights Reserved. Page 6

RADIUS describes support for RADIUS running under port 1812. If you selected the default RADIUS Port value during the Deepnet

RADIUS server configuration then select NEW-RADIUS as your choice.

Shared Enter the shared secret that will be used to allow for secure

Secret communication with the RADIUS Server. In this case, this will match the Shared Secret entered when you defined the RADIUS Client in DualShield.

Version Select the RADIUS Ver. 2.0 Compatible choice from the selection list.

Priority Select the default value of 1. The Priority value is used to indicate which server gets priority when multiple RADIUS servers are defined.

Click the OK button when you are done to both save your configuration and return to SmartDashboard.

3.3 Defining the External User Profile

External User Profiles are profiles of externally defined users, that is, users who

are not defined in the internal user’s database or on an LDAP server. External user profiles are used to avoid the burden of maintaining multiple user databases,

Page 8: DualShield Unified Authentication - Deepnet Security Point VPN... · DualShield RADIUS server which is a part of the DualShield Unified Authentication Platform. The aim of this integration

Implementation Guide Check Point VPN

Copyright © 2011, Deepnet Security. All Rights Reserved. Page 7

by defining a single, generic profile for all external users. External users are authenticated based on either their name or their domain.

A User Group must be defined that will represent those users authenticating with DualShield RADIUS server. Within the SmartDashboard console, define a new RADIUS Server object. In the Users and Administrators object tree, select

External User Profiles, right click and select New External User Profile and then Match all users.... Several screens will be navigated to properly define the new External User Profile.

Once the External User Profile Properties window is displayed do the following:

1. Select the Group tab and move the User Group defined earlier from the Available Groups list to the Belongs to Groups list. In our example, the VPN_Users group is selected and moved to the Belongs to Groups list.

Page 9: DualShield Unified Authentication - Deepnet Security Point VPN... · DualShield RADIUS server which is a part of the DualShield Unified Authentication Platform. The aim of this integration

Implementation Guide Check Point VPN

Copyright © 2011, Deepnet Security. All Rights Reserved. Page 8

2. Select the Authentication tab and select RADIUS as the Authentication Scheme. Within the Settings section, choose the RADIUS server that you

defined earlier. In our example, it is “deepnet_radius”.

Page 10: DualShield Unified Authentication - Deepnet Security Point VPN... · DualShield RADIUS server which is a part of the DualShield Unified Authentication Platform. The aim of this integration

Implementation Guide Check Point VPN

Copyright © 2011, Deepnet Security. All Rights Reserved. Page 9

3.4 Defining the User Group

A User Group must be defined that will represent those users authenticating with Deepnet RADIUS server. Within the SmartDashboard console, define a new RADIUS Server object. In the Users and Administrators object tree, select User

Groups, right click and select New User Groups.... Enter in the details that will describe the Deepnet RADIUS Server using the following as a guide:

Name Enter in a unique group name. Note that this is a required field and is case sensitive. In our example, we named this VPN_Users.

Comment Add additional text to describe the User Group

Color Allows for color coding Network Objects within the SmartDashboard. Follow internal standards or take the default color.

Next, move the users, external user profiles or groups to be included in this group from the Not in Group list to the In Group list. In our case, we defined an External User Profile. In our example, we moved the External User Profile

generic* to the In Group list.

Click OK to complete the definition.

Page 11: DualShield Unified Authentication - Deepnet Security Point VPN... · DualShield RADIUS server which is a part of the DualShield Unified Authentication Platform. The aim of this integration

Implementation Guide Check Point VPN

Copyright © 2011, Deepnet Security. All Rights Reserved. Page 10

3.5 Configuring the Global Properties

There are certain attributes within the Check Point NG/NGX Global Properties that must be checked to ensure a successful integration. In order to support RADIUS authentication, Check Point NG/NGX must operate in Hybrid Mode and must be

configured to ignore certain RADIUS attributes that Deepnet RADIUS server sends back. These configuration changes will be performed within this section. Access the Global Properties section by selecting Policy from the toolbar and then

choosing Global Properties option at the bottom.

Next, validate or configure the following:

1. Hybrid Mode

Expand the Remote Access option and then select VPN – Basic.

For R55, make sure the Hybrid Mode (VPN-1 & FireWall-1 authentication) option is selected. If not, select this option.

Page 12: DualShield Unified Authentication - Deepnet Security Point VPN... · DualShield RADIUS server which is a part of the DualShield Unified Authentication Platform. The aim of this integration

Implementation Guide Check Point VPN

Copyright © 2011, Deepnet Security. All Rights Reserved. Page 11

Page 13: DualShield Unified Authentication - Deepnet Security Point VPN... · DualShield RADIUS server which is a part of the DualShield Unified Authentication Platform. The aim of this integration

Implementation Guide Check Point VPN

Copyright © 2011, Deepnet Security. All Rights Reserved. Page 12

For R60, make sure the Support Legacy Authentication for SC (hybrid mode), L2TP (PAP), and Nokia clients (CRACK) option is selected. If not,

select this option.

Page 14: DualShield Unified Authentication - Deepnet Security Point VPN... · DualShield RADIUS server which is a part of the DualShield Unified Authentication Platform. The aim of this integration

Implementation Guide Check Point VPN

Copyright © 2011, Deepnet Security. All Rights Reserved. Page 13

2. Ignore RADIUS Attribute 80

Check Point NG/NGX only recognizes RADIUS attributes from 1 to 63 as defined within RFC 2138. By default, DualShield RADIUS server returns RADIUS attribute 80, Check Point NG/NGX must be told to ignore it otherwise this response will be blocked and the RADIUS authentication will fail. To have Check Point NG/NGX

ignore RADIUS attribute 80, select SmartDashboard Customization at the bottom of the Global Properties window.

Next, click the Configure button at the bottom of the window. Under FireWall-1, expand the Authentication section and then select RADIUS to expose all attributes.

Update the radius_ignore attribute as follows: radius_ignore Change this from 0 to 80. This will instruct Check Point

NG/NGX to ignore RADIUS Attribute 80 if it receives it. This

allows the DualShield RADIUS server challenge to be displayed to the end user by the Check Point SecurRemote Client.

Also, consider increasing the timeout values related to RADIUS authentication. These attributes were increased to take into account that DualShield RADIUS server is now part of the RADIUS authentication process.

radius_retrant_num Change from 2 to 10. radius_retrant_timeout Change timeout value from 120 to 180.

Page 15: DualShield Unified Authentication - Deepnet Security Point VPN... · DualShield RADIUS server which is a part of the DualShield Unified Authentication Platform. The aim of this integration

Implementation Guide Check Point VPN

Copyright © 2011, Deepnet Security. All Rights Reserved. Page 14

radius_user_timeout Change from 600 to 750 radius_connect_timeout Change from 120 to 180.

Also, make sure that the radius_send_framed is unchecked.

Alternatively, you can configure the Radius client in DualShield so that DualShield Radius server will not return attribute 80.

Page 16: DualShield Unified Authentication - Deepnet Security Point VPN... · DualShield RADIUS server which is a part of the DualShield Unified Authentication Platform. The aim of this integration

Implementation Guide Check Point VPN

Copyright © 2011, Deepnet Security. All Rights Reserved. Page 15

4. Configuring Check Point SecureClient Check Point offers two clients as part of its IPSEC VPN solution: SecureClient and SecureRemote. This document describes the configuration of the Check Point

SecureClient. The Site Wizard leverages user authentication to help in configuring a new Check Point Site. Make sure that the user name that you use in the Site Wizard exists

within Active Directory and that this same user exists within DualShield with the same user name. In addition, the user must have an active OTP token or GridID card associated with their account. See the DualShield Administration Guide for

more details on importing users from AD and assigning OTP tokens to users. 1. Start the Check Point SecureClient, select the Sites menu option and then

Create New. If no Sites are defined, you will be asked if you want to create a

new site. Click the Yes button.

2. Enter the IP address of the Check Point NG/NGX server that this client will be

connecting to.

3. Choose the Authentication Method to be used. Choose Challenge Response if

you will use tokens/cards that supports challenge and response, such as QuickID, MobileID and GridID. Or choose User name and Password if you want to use Password + OTP only. In our example, we choose Challenge Response.

Page 17: DualShield Unified Authentication - Deepnet Security Point VPN... · DualShield RADIUS server which is a part of the DualShield Unified Authentication Platform. The aim of this integration

Implementation Guide Check Point VPN

Copyright © 2011, Deepnet Security. All Rights Reserved. Page 16

4. Enter your User Name. Since the RADIUS server has been configured to authenticate users against Active Directory, this will essentially be your Active Directory or Windows user ID.

5. Choose your connectivity settings option. In most deployments, the Standard

option will suffice.

Page 18: DualShield Unified Authentication - Deepnet Security Point VPN... · DualShield RADIUS server which is a part of the DualShield Unified Authentication Platform. The aim of this integration

Implementation Guide Check Point VPN

Copyright © 2011, Deepnet Security. All Rights Reserved. Page 17

6. Check Point SecureClient has all the information needed to attempt a

connection with the new site being configured.

7. The Site Configuration Wizard requires that the user authenticate. First, it will

prompt the user to enter his/her password. This is the user’s AD password or Deepnet StaticPass.

Page 19: DualShield Unified Authentication - Deepnet Security Point VPN... · DualShield RADIUS server which is a part of the DualShield Unified Authentication Platform. The aim of this integration

Implementation Guide Check Point VPN

Copyright © 2011, Deepnet Security. All Rights Reserved. Page 18

8. Next, it will prompt the Challenge Code or Message and ask the user to enter

the Response Code. The content and format of the Challenge Code varies according to authentication methods and the type of the token used.

Authentication Method: Static Password >> One-Time Password

Token Challenge Code T-Pass please enter your OTP SafeID please enter your OTP MobileID please enter your OTP

GridID please enter your OTP Authentication Method: Static Password >> Challenge/Response

Token Challenge Code MobileID numeric code, such as 562822 GridID Coordinates, such as M1 B6 T8 C3

Page 20: DualShield Unified Authentication - Deepnet Security Point VPN... · DualShield RADIUS server which is a part of the DualShield Unified Authentication Platform. The aim of this integration

Implementation Guide Check Point VPN

Copyright © 2011, Deepnet Security. All Rights Reserved. Page 19

9. Upon a successful authentication, the Site Wizard indicates that the site was created successfully. Click the Finish button to save the Site data and close the wizard.

Page 21: DualShield Unified Authentication - Deepnet Security Point VPN... · DualShield RADIUS server which is a part of the DualShield Unified Authentication Platform. The aim of this integration

Implementation Guide Check Point VPN

Copyright © 2011, Deepnet Security. All Rights Reserved. Page 20

5. Testing Check Point SecureClient

Assuming that you have created a user account in DualShield for a user named John Smith, and the user account has a GridID for the 2-factor authentication.

The GridID is set in the mode of Challenge and Response. 1. Start the Check Point VPN-1 SecureClient. Enter the user name “john.smith”

and user’s AD password. Click Connect.

Page 22: DualShield Unified Authentication - Deepnet Security Point VPN... · DualShield RADIUS server which is a part of the DualShield Unified Authentication Platform. The aim of this integration

Implementation Guide Check Point VPN

Copyright © 2011, Deepnet Security. All Rights Reserved. Page 21

2. SecureClient displays the progress of the connection.

3. The user is prompted for their GridID coordinates. Enter the corresponding

values to the GridID coordinates displayed into the Response field. Click the Connect button to submit these to DualShield for validation.

Page 23: DualShield Unified Authentication - Deepnet Security Point VPN... · DualShield RADIUS server which is a part of the DualShield Unified Authentication Platform. The aim of this integration

Implementation Guide Check Point VPN

Copyright © 2011, Deepnet Security. All Rights Reserved. Page 22

4. The following dialog box is displayed indicating that the user authentication was successful using Deepnet GridID. Click OK to continue.

Page 24: DualShield Unified Authentication - Deepnet Security Point VPN... · DualShield RADIUS server which is a part of the DualShield Unified Authentication Platform. The aim of this integration

Implementation Guide Check Point VPN

Copyright © 2011, Deepnet Security. All Rights Reserved. Page 23

6. Configuring Check Point Connectra NGX R61/R62 In order to make Check Point Connectra NGX R61/R62 work with DualShield RADIUS server, the configuration is largely the same as NG R55, NGX R60. The

Connectra system must be configured to communicate via RADIUS with the DualShield RADIUS server and the RADIUS attribute 80 must be ignored. In order to configure Connectra to communicate with the DualShield RADIUS

server you will need to navigate within the Connectra administration portal to “Users and Groups -> Authentication -> RADIUS” and define a new object. In the below example the hostname avalanche at IP 10.133.2.165 is the DualShield

RADIUS Server.

Page 25: DualShield Unified Authentication - Deepnet Security Point VPN... · DualShield RADIUS server which is a part of the DualShield Unified Authentication Platform. The aim of this integration

Implementation Guide Check Point VPN

Copyright © 2011, Deepnet Security. All Rights Reserved. Page 24

Next, define a generic* user to use the newly configured RADIUS server entry

Once this has been setup you will need to force the Connectra system to ignore RADIUS attribute 80. In order to do this, login to the Connectra command line (via console, ssh etc.), enter ‘Expert’ mode and perform the following steps:

1. Issue 'cpstop'

2. Make a backup copy of $FWDIR/conf/objects_5_0.C, i.e.

cp $FWDIR/conf/objects_5_0.C /objects_backup.C

3. Edit $FWDIR/conf/objects_5_0.C (using vi, etc.)

4. Search for the following

:radius_groups_attr (25) :radius_retrant_num (2)

Change it to

:radius_groups_attr (25) :radius_ignore (80)

:radius_retrant_num (2) :radius_send_framed (disabled)

5. Save the file and issue 'cpstart'

Be very careful about syntax, extraneous characters etc. when editing objects_5_0.C – if you are uncertain about how to edit this file please contact Check Point Technical services for assistance.

Page 26: DualShield Unified Authentication - Deepnet Security Point VPN... · DualShield RADIUS server which is a part of the DualShield Unified Authentication Platform. The aim of this integration

Implementation Guide Check Point VPN

Copyright © 2011, Deepnet Security. All Rights Reserved. Page 25

7. Testing Check Point Connectra NGX R61/R62 You can test the Connectra by logging into the user portal page. In this example, let’s use Depenet QuickID.

After providing the password, DualShield will verify your username and password. If the verification is successful, the Deepnet QuickID will send the user a one-time password (OTP) to the user’s mobile phone by SMS. This OTP will be used as the

Response code. In the meantime, on the logon screen, it will ask you to enter the Response code.

Once you have received your OTP, enter it in the Response field.

Page 27: DualShield Unified Authentication - Deepnet Security Point VPN... · DualShield RADIUS server which is a part of the DualShield Unified Authentication Platform. The aim of this integration

Implementation Guide Check Point VPN

Copyright © 2011, Deepnet Security. All Rights Reserved. Page 26

DualShield will then verify your one-time password. When then authentication is successful, you’ll received a confirmation message on the screen.