Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
LazarusG
Contributor
Contributor

mgmt and stealth rule for on-prem gateway and maas?

Hi 

Hope this is the right location for this post(?)

Potentially dumb question: what is best practice for a mgmt and stealth rule on an on-prem policy if the manager is cloud/maas?

If mgmt is through the maas tunnel, (which is reliant on fqdn resolution on the gw?) would this instruction be valid still?

Best Practices for Access Control Rules

Thanks!

0 Kudos
11 Replies
the_rock
Legend
Legend

Thats totally valid question @LazarusG . Personally, I would say same would technically apply. Thats at least what TAC told me about this 2 years ago.

Andy

0 Kudos
PhoneBoy
Admin
Admin

When using Smart-1 Cloud, all connectivity between management and gateway is via a single HTTPS connection initiated from the gateway. 
No specific rules should be necessary unless you've disabled the Implied Rule that allows Outbound traffic from the Gateway.

0 Kudos
LazarusG
Contributor
Contributor

Thanks - the reasons for asking is that the policy has  no stealth rule at the moment but we are trying to prevent external access to the https cert - I have looked at many SKs but in my lab building on-prem environment incrementally the stealth rule if the first thing that deterministically stops the access. However this is an on-prem lab not maas.

0 Kudos
LazarusG
Contributor
Contributor

If the on-prem box calls home - does this mean we dont even need a mgmt rule unless you want to access gaia from private-nets? 

0 Kudos
LazarusG
Contributor
Contributor

I asked the support centre AI - it has impressed me more than once lately..

"To properly manage an on-premises gateway using MaaS (Management as a Service) and configure the correct management and stealth rules, follow these steps:

Management Rule
Allow Management Traffic:
Ensure that the gateway can communicate with the MaaS service. This typically involves allowing outbound HTTPS traffic to the MaaS service endpoints.
Example rule:
Source: Gateway
Destination: <Service-Identifier>.maas.checkpoint.com
Service: HTTPS (TCP/443)
Action: Allow

Stealth Rule
Configure Stealth Rule:
A stealth rule is used to protect the gateway itself from unauthorized access. It should be placed at the top of the rule base to drop any traffic that is not explicitly allowed.
Example rule:
Source: Any
Destination: Gateway
Service: Any
Action: Drop

Additional Considerations
Bidirectional Rules:
Ensure that the rules are bidirectional if necessary, especially for management traffic that requires responses.
NAT Configuration:
If the gateway is behind a NAT device, ensure that the NAT configuration allows the necessary traffic to pass through.
Example Configuration
Here is an example of how the rules might look in a simplified format:

Rule No. Source Destination Service Action
1 Any Gateway Any Drop
2 Gateway .maas.checkpoint.com HTTPS (TCP/443) Allow
3 ... ... ...
Verifying Configuration
Check MaaS Tunnel:
Ensure the MaaS tunnel is up and running by using the following commands in Expert mode:
maas status
show security-gateway cloud-mgmt-service

Check Interface:
Verify the
maas_tunnel
interface is configured correctly:
ifconfig

By following these steps, you can ensure that your on-premises gateway is properly managed by MaaS and protected by a stealth rule.

BE AWARE
Important - To prevent negative impact on your production environment, double-check the provided information in the Administration Guide for the involved product."

0 Kudos
LazarusG
Contributor
Contributor

can anyone sanity check that ai response as it looks awesome but dont want people to lock themselves out of their gateways by following info published in this post 🙂

0 Kudos
LazarusG
Contributor
Contributor

From Quantum Smart-1 Cloud Administration Guide: assuming r81.20 =  I guess you allow any private nets in a mgmt rule and block everything else with a stealth rule;

"Which ports must be open on the Security Gateway?
You must allow outbound HTTPS traffic to FQDN listed below to allow the communication
between the Security Gateway and the service:
n To your domain at Smart-1 Cloud:
<Service-Identifier>.maas.checkpoint.com
n For Smart-1 Cloud deployments in Europe:
cloudinfra-gw.portal.checkpoint.com
n For Smart-1 Cloud deployments in the United States:
cloudinfra-gw-us.portal.checkpoint.com
n For Smart-1 Cloud deployments in the APAC:
https://cloudinfra-gw.ap.portal.checkpoint.com
From version R80.40, there is an implied rule that always allows this traffic when working in
the MaaS mode."

Apologies for being so confused!

0 Kudos
the_rock
Legend
Legend

Here is what I got 🙂

Andy

 

Screenshot_1.png

0 Kudos
LazarusG
Contributor
Contributor

awesome - it is quite an impressive feature!

I would say that it would be nice for the documentation to have an example policy for when onboarding.

0 Kudos
the_rock
Legend
Legend

Yes, absolutely, its a fantastic feature.

Andy

0 Kudos
the_rock
Legend
Legend

Forgot to paste below, its just another question that auto-populated, but makes sense 🙂

Andy

 

Screenshot_1.png

0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events