- Products
- Learn
- Local User Groups
- Partners
-
More
Join Us for CPX 360
23-24 February 2021
Important certificate update to CloudGuard Controller, CME,
and Azure HA Security Gateways
How to Remediate Endpoint & VPN
Issues (in versions E81.10 or earlier)
IDC Spotlight -
Uplevel The SOC
Important! R80 and R80.10
End Of Support around the corner (May 2021)
I recently bought a 3000-series appliance and am having difficulty connecting it to my network. I have a small business cable internet connection with a regular cable modem. I would like to use my cable modem's DHCP server to keep things simple.
I wired it up like this:
Cable Modem Eth0 Port to CheckPoint eth5 Port
CheckPoint eth0 Port to laptop
Can anyone share what my network settings on the firewall should be?
I have the interfaces set to "Obtain IPv4 address automatically" and set an IPv4 Static Route of, "Destination Address: Default" to Gateways: "eth5"
I'm not getting any DHCP address on my laptop and if I set a static IP and try to ping my cable modem from my laptop it will not ping.
I'm probably in over my head, but I want to use this to replace my old Meraki device and am pretty excited to start learning the platform. Any help you could spare would be immensely appreciated.
Seems to me that there are number of things that you should configure for your setup to work properly:)
1. On your 3000 appliance is the interface labeled "Mgmt" I suspect that you have used it for initial configuration of the appliance. Please connect your laptop/management PC to it.
2. Configure static IP address from the range you were previously getting from your router on eth0 (i.e. 192.168.1.2 with the gateway being the that of your router, i.e. 192.168.1.1)
3. You will be better-off using firewall's built-in DHCP server, instead of passing-through the DHCP requests to your router, so I suggest defining another network for internal scope (i.e. 192.168.2.0/24) and assign it to your eth5.
4. For DNS, I suggest using 9.9.9.9 (IBM quad9 secure DNS server that is marginally better than Google's in terms of privacy)
5. Now, create the outbound rule permitting network 192.168.2.0/24 to access the Internet.
6. Once connected, enable security features such as IPS, AV, Antibot, etc... and configure their automatic update schedule.
Cheers,
Vladimir
I am very much agreed with Vladimir. To add, just login to the modem (most probable IP would be 192.168.1.1 - depends on modem) and check the settings, IP ranges etc. You should give IP to eth5 within that range and after that you can follow with Vladimir's post.
Don't forget-if using another address range for your internal network you will need to configure the 3000 device to NAT that traffic so that the cable modem recognizes those packets.
You will need to configure DHCP relay to point to the modem as the gateway will drop all broadcast traffic if each gateway NIC is a layer 3 interface, as opposed to bridge mode like on the smaller 1400 appliances where all interfaces are sitting in a single logical switch named LAN1.
Honestly though, just do DHCP on the gateway and ensure rule 1 permits bootp and or DHCP requests to the local module to ensure DHCP is not dropped on the stealth rule.
I really appreciate the help you all are offering me. I'm still stuck at the basic connectivity of this darn thing!
I set rule 1 to allow all from all to all just to keep it simple and get this thing working. No other rules exist.
Could anyone specifically tell me what exactly I should set the interfaces to as an example? I tried doing what was recommended above but none of it worked. I must be doing something wrong, but after a ton of hours I just can't get it! I really wish there was a simple write-up on how to get this to work.
HI Red,
I feel your pain. Although there is no "simple write-up" for a 3200 appliance - Check Point is kind of complicated - it seems to me the first step here is to see if the firewall has an outside IP address and can see the world.
First thing: Does the firewall have a public IP address on eth5? You set it to get a number assigned automatically, but did it actually get an address?
Second thing: I notice you set the default gateway to "eth5" the default gateway for the firewall would not be its own interface. It would be the IP address of your modem or some other address the modem hands the firewall. (It would basically be the same stuff handed to your PC if you connected it direct.) Bottom line, it would be a public IP address different from the firewall's external IP. And looks something like this:
More importantly, if your outside interface is getting a DHCP-assigned address, then it should automatically pick up the default gateway as well. The fact that you're writing your own default gateway kind of makes me stop and go, "Hold on, let's back up a step."
So, I would start there. Do you have an actual IP address on the external interface? Is the default gateway set to the upstream modem? Can you ping it?
All of these need to be "yes" before you can really do anything else.
Let's start with some basic questions:
Assuming the answers are as I specified above, you will need to contact your cable company and inquire about a static IP address.
A static IP is required for a self-managed 3200 series appliance.
If you cannot get a static IP address, you will be much better off with a 7xx/14xx series appliance, which is generally more geared for this sort of deployment.
Regardless of the appliance, you will typically have two interfaces configured:
You will also need to enable an Address Translation rule or have the following checkbox enabled on your gateway object in SmartConsole:
I strongly encourage you to engage with your local Check Point SE/reseller to assist you to make sure you have the correct solution for your deployment.
If you can send me a private message with where you're located, I can help locate the correct resource to assist you.
Not an ideal solution you have there with a 3000 box. You’re better off having that with a public IP on its external interface so see if you can bridge your cable modem so that you can get an external IP on your 3000-series. If that means you’ve got to set up a PPPoE connection, get something like a Cisco RV042 to sit between the firewall and the cable modem to make your life a bit easier. Disabling SecureXL to make the PPPoE connection work is a pain as it means you can’t do other stuff.
(Remember that the main function of your cable modem is just a means for your ISP to extract money from you on a monthly basis so don’t expect that box to be anything dazzling or “feature-rich”.)
If you can’t bridge the cable modem, provided you’ve got an IP range assigned to your connection, assign the same IP address to the internal interface on the cable modem as you have on the external interface of it and turn off any NAT and firewall. Then assign one of your other public IPs to the external interface of your 3000-series and use the IP of your cable modem as your DG. (This is also where the little Cisco box can help you out massively.)
Once you’ve done that, make sure Gaia can update itself with time via NTP. If it can’t, open a console window and ping stuff to see where the problem lies.
Next, make sure CPUSE can do its updates and apply the latest patches and Jumbo Hotfix.
Now you know you have an internet connection you can move on to SmartDashboard. Make sure you’ve got the latest version of that too.
Topology is important so make sure you have that correct and don’t activate any other blades until you know you have access externally. Log everything and get SmartLog auto-refreshing so that you can see what is going on.
Once you’ve got connection, turn on the blades one by one and push policy after each one so that you know the effect it has on the logs.
About CheckMates
Learn Check Point
Advanced Learning
WELCOME TO THE FUTURE OF CYBER SECURITY